Attacks on software supply chains surged in 2022. A few years after word of the SolarWinds hack first spread, software supply…
Data analytics firm Palantir Technologies has cut about two percent of its workforce, joining a raft of US companies that…
Microsoft is now force-installing the Microsoft Defender for Individuals application when installing or updating the Microsoft 365 apps. It was…
On February 27, 2023, a Twitter user named MCbcMC2005 (Twitter/MCbcMC2005) tweeted that the Two-Factor Authentication exploits in Grand Theft Auto…
Discover how the latest cybersecurity regulations are influencing the medical device industry. Learn about the measures manufacturers are taking to…
Broadcom is set to receive an EU antitrust warning about the possible anti-competitive effects of its proposed US$61 billion (A$94.5…
Threat actors are promoting a new ‘Exfiltrator-22’ post-exploitation framework designed to spread ransomware in corporate networks while evading detection. Threat…
PureCrypter delivers multiple types of malware and info-stealers, including Redline Stealer, Eternity, AgentTesla, Philadelphia Ransomware, and Blackmoon. The cybersecurity researchers…
Lockbit 3.0 ransomware group claims to have hacked the Ministry of Commerce and Industry (MOCI) of Kuwait. The website of…
Hackers are actively exploiting two critical-severity vulnerabilities in the Houzez theme and plugin for WordPress, two premium add-ons used primarily…
[ This article was originally published here ] As part of its expanded , (ISC)² and its partner, (Blacks United…
Almost half of all organisations are not fully ready to adapt to disruptions from either a recession (48%) or competitors…