Mar 22, 2024NewsroomCyber Defense / Vulnerability A China-linked threat cluster leveraged security flaws in Connectwise ScreenConnect and F5 BIG-IP software…
Nationwide building society is recovering from an IT outage that caused significant difficulties for customers over a period of several…
A new side-channel attack called “GoFetch” impacts Apple M1, M2, and M3 processors and can be used to steal secret…
The Security Operations Center (SOC) is critical to any organization’s cybersecurity strategy. Every SOC’s success hinges on the competence of…
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light…
Attackers are taking advantage of vulnerabilities in JetBrains Teamcity to distribute ransomware, coinminers, and backdoor payloads. Two critical vulnerabilities in…
Cybersecurity researchers have detected a new wave of phishing attacks that aim to deliver an ever-evolving information stealer referred to…
The Open Data Institute (ODI) is calling on UK political parties to adopt a number of manifesto commitments around data,…
Securing Kubernetes clusters may feel overwhelming, as it’s often challenging to prioritize security investments and focus on what matters. In…
Linux systems are used widely for servers, cloud environments, and IoT devices, which makes them an attractive target to cybercriminals,…
Digital Transformation EXPO Manchester (DTX) has announced the dates for this years exhibition, with the events doors opening on 22-…
Security researchers have uncovered a sophisticated method of exploiting the Dynamic Host Configuration Protocol (DHCP) administrators group to escalate privileges…











