Set rules on technologies discovered on your attack surface AppSec teams often struggle to either validate or scale their security…
Websites and mobile apps of Lloyds Bank, Halifax, TSB Bank, and Bank of Scotland are experiencing web and mobile app outages…
Charming Kitten, the infamous Iranian nation-state group, is actively targeting victims across Europe, U.S., India and Middle East with a…
The Cosmos cooperative bank in Pune, among the city’s oldest urban cooperative banks, has fallen prey to cyber fraudsters. Hackers…
Challenges for Traditional Security Teams Traditional security teams are typically reactive. They’re seen as change-resistant, out of sync with development,…
Apr 28, 2023Ravie LakshmananMalware / Cyber Threat South Korean education, construction, diplomatic, and political institutions are at the receiving end…
It’s soon time for Summer vacation to begin, and we’ve asked our colleagues to share some of their summer learning…
Apple Inc’s released products are known for their progressive innovation, and the best example to prove it is the invention…
A new macOS malware called Atomic macOS Stealer (AMOS) was discovered by the Cyble Research and Intelligence Labs (CRIL) on…
Using undetectable spying devices on partners can be illegal, and it can lead to serious legal consequences. In many countries,…
What Is Vulnerability Testing? Vulnerability testing, also known as vulnerability assessment, evaluates an entire system to look for security weaknesses…
Google uses Cryptbot info stealer for infecting Chrome users and stealing data, taking down associated malware infrastructure. The sole goal…