The interim findings of the Competition and Markets Authority’s (CMA’s) investigation into Microsoft’s cloud software licensing strategy should be a…
A dark web hacker that goes by the name “Tombstone” has claimed and advertised multiple vulnerabilities affecting a subdomain affiliated with…
The Black Basta ransomware operation is suspected of exploiting a Windows privilege escalation vulnerability (CVE-2024-26169) as a zero-day before a…
The Cardinal cybercrime group (aka Storm-1811, UNC4393), which operates the Black Basta ransomware, may have been exploiting a recently patched…
Last week, the notorious hacker gang, ShinyHunters, sent shockwaves across the globe by allegedly plundering 1.3 terabytes of data from…
By Published: 12 Jun 2024 The public cloud is a cloud computing model that enables resources such as applications, data…
The MEDUSA ransomware group has reared its ugly head again and this time it has claimed to have targeted three…
JetBrains fixed IntelliJ IDE flaw exposing GitHub access tokens Pierluigi Paganini June 12, 2024 JetBrains warned to fix a critical…
Coathanger – a piece of malware specifically built to persist on Fortinet’s FortiGate appliances – may still be lurking on…
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a call to action for administrators and security professionals to review…
In fact, ransomware attacks on health care targets were on the rise even before the Change Healthcare attack, which crippled…
Phishing scams are a constant threat, but have you ever wondered which brands scammers impersonate the most? New research by…











