Four hours or less: that’s how long it takes for Akira affiliates to break into organizations and deploy the ransomware…
Another day, another settlement. Amazon has settled a lawsuit filed by the Federal Trade Commission (FTC) over misleading customers who…
Jaguar Land Rover (JLR) plans to resume some of its car-making over the next few days, in the wake of…
Vulnerability management is always a race. Attackers move quickly, scans take time, and if your scanner can’t keep up, you’re…
As attackers increasingly leverage Scalable Vector Graphics (SVG) for stealthy code injection, security researchers face mounting challenges in detecting obfuscated…
Cybersecurity isn’t a game of defense—it’s a game of anticipation. Yet too many CISOs and security leaders still think in…
A newly discovered zero-click remote code execution (RCE) vulnerability in WhatsApp is putting millions of Apple users at risk. Researchers from DarkNavyOrg…
We’ve covered spyware and stalkerware leaks many times before, but we don’t often see such exposure in software used by…
As cloud adoption accelerates, organisations rely on Service Level Agreements (SLAs) to define expectations around availability, security, and performance, to…
UK retail giant Harrods has disclosed a new cybersecurity incident after hackers compromised a third-party supplier and stole 430,000 records…
A newly observed spear-phishing campaign is leveraging sophisticated social engineering lures to distribute DarkCloud, a modular malware suite designed to…
Adversaries don’t work 9–5 and neither do we. At eSentire, our 24/7 SOCs are staffed with elite threat hunters and…










