Russia implemented a sweeping ban on Microsoft Cloud services on March 20th, with plans to extend the prohibition to Google…
Financially motivated hackers have been leveraging SmokeLoader malware in a series of phishing campaigns predominantly targeting Ukrainian government and administration…
Mar 22, 2024NewsroomPrivacy / Encryption The U.S. Department of Justice (DoJ), along with 16 other state and district attorneys general,…
Pwn2Own Vancouver 2024 has ended with security researchers collecting $1,132,500 after demoing 29 zero-days (and some bug collisions). Throughout the event,…
Despite JavaScript’s widespread use, writing secure code remains challenging, leading to web application vulnerabilities. Experiments on real-world vulnerabilities show LLMs…
QR codes, once a simple tool for scanning and accessing information swiftly, have become a ubiquitous feature in our digital…
The use of hybrid multicloud models is forecasted to double over the next one to three years as IT decision…
Mar 22, 2024NewsroomLinux / Cyber Warfare The data wiping malware called AcidPour may have been deployed in attacks targeting four…
Here’s a look at the most interesting products from the past week, featuring releases from Appdome, Drata, GlobalSign, Ordr, Portnox,…
South Australia’s education management system (EMS) rollout has only reached half of the state’s 900 schools but spent 70 percent of…
Ransomware continues to hit organizations in all sectors, and attacks regularly make media headlines because of their hard-hitting impact on…
Cybersecurity researchers have identified a new form of denial-of-service (DoS) attack that could disrupt over 300,000 internet-connected systems worldwide. This…











