Mar 19, 2024NewsroomLinux / Cyber Espionage A new variant of a data wiping malware called AcidRain has been detected in…
The cyber security function isn’t a back office team that is never seen and never heard. To truly protect the…
The Cybersecurity and Infrastructure Security Agency (CISA) has taken a significant step towards fortifying the cybersecurity of federal systems with…
The US Defense Logistics Agency (DLA) reportedly experienced a data breach, allegedly attributed to the Russian Evilics Group, as disclosed…
A proof of Concept (PoC) has been published for a critical Remote Code Execution (RCE) vulnerability identified in Fortra’s FileCatalyst…
A renowned software documentation platform has confirmed a security breach that led to the unauthorized access of 91 GitHub tokens….
NHS Dumfries and Galloway suffered a cyberattack, potentially compromising patient data. The health board is working with authorities. Learn more…
Verimatrix released its new Verimatrix Counterspy anti-piracy solution. Counterspy leverages technology first developed by the company’s cybersecurity team back in…
Social media influencers are attractive targets for identity thieves. With large followings and a literal influence on their followers, it’s…
Mar 19, 2024NewsroomEmail Security / Social Engineering Threat actors are leveraging digital document publishing (DDP) sites hosted on platforms like…
New research has revealed that more than 900 websites had a serious misconfiguration, which exposed a massive 125 million user…
Pentest People, the Penetration Testing as a Service (PTaaS®) and cybersecurity experts, today announces it has become one of only…











