Log files are like an internet of things (IoT) for IT. Log data is vital for all IT organisations –…
Apr 15, 2024NewsroomSpyware / Mobile Security Cybersecurity researchers have discovered a “renewed” cyber espionage campaign targeting users in South Asia…
Nexperia, a Chinese chipmaker, has recently been the victim of a massive data breach where gigabytes of sensitive information have…
The revival of the LightSpy malware campaign has been observed, focusing on Indian Apple device users. This sophisticated mobile spyware,…
Cyber threats are not only escalating in frequency but also growing more sophisticated, highlighting the indispensable role of cybersecurity awareness…
The European Union’s (EU) Artificial Intelligence (AI) Act “fails to effectively protect the rule of law and civic space”, according to…
Recent Asian campaigns have seen an uptick in attacks targeting Linux systems, leveraging the notorious Pupy Remote Access Trojan (RAT)….
ShadowDragon announced significant enhancements to its Open-Source Intelligence Investigative platform Horizon. These updates represent a milestone in the evolution of…
April 12, 2024 – Wondering whether changing your SSN is an option. Read here what you need to qualify for…
Apr 15, 2024NewsroomFirewall Security / Vulnerability Palo Alto Networks has released hotfixes to address a maximum-severity security flaw impacting PAN-OS…
The automotive industry is experiencing a surge in BEC and VEC attacks, a type of email scam designed to trick…
The Web3 movement is going from strength to strength with every day that passes. Slowly but surely, it’s building a…

