Google is updating the client-side encryption mechanism for Google Meet to allow external participants, including those without Google accounts, to…
Volkswagen, one of the world’s leading automotive manufacturers, has fallen victim to a sophisticated hacking operation in a significant cybersecurity…
According to the Department for Science, Innovation and Technology (DSIT), only 17% of the UK cyber sector workforce is female,…
The widely used MySQL2 has been discovered to have three critical vulnerabilities: remote Code execution, Arbitrary code injection, and Prototype…
Security awareness training and phishing simulation specialist KnowBe4, the firm behind the popular Inside Man cyber training movies, has announced…
The Federal Trade Commission is sending $5.6 million in refunds to Ring users whose private video feeds were accessed without…
CrushFTP disclosed a zero-day vulnerability (CVE-2024-4040) affecting versions below 10.7.1 and 11.1.0. The vulnerability allows remote attackers with low privileges…
AI-powered generative tools have supercharged phishing threats, so even newbie attackers can effortlessly create refined, individualized campaigns. Protecting data and…
24 Apr An MSSP Shares the Latest in Ransomware: What’s Up, and What to Do About It What are the…
Apr 24, 2024NewsroomMalware / Endpoint Security Cybersecurity researchers have discovered an ongoing attack campaign that’s leveraging phishing emails to deliver…
A bill giving TikTok’s China-based owner ByteDance until January 2025 to sell up or get out of town has sailed…
Hackers hijacked the eScan Antivirus update mechanism in malware campaign Pierluigi Paganini April 24, 2024 A malware campaign has been…











