Splunk announced Splunk Asset and Risk Intelligence, a solution designed to power the SOC of the future by helping businesses…
Several security experts have recently discovered that Xiaomi Android devices are suffering from a range of security vulnerabilities that affect…
Cybercriminals are vipers. They’re like snakes in the grass, hiding behind their keyboards, waiting to strike. And if you’re a…
Quantifying Cyber Risk: A Business Imperative One of the most pressing issues for businesses today is understanding cyber risk in…
El Salvador suffered a massive leak of biometric data Pierluigi Paganini May 06, 2024 Resecurity found a massive leak involving…
A highly concerning security loophole was recently discovered in a WordPress plugin called “Email Subscribers by Icegram Express,” a popular…
MedStar Health, a primary healthcare provider in the United States, has reported a significant data breach involving unauthorized access to…
Despite NSO Group’s claims, spyware has continued to target journalists, dissidents, and protesters. Saudi journalist and dissident Jamal Khashoggi’s wife,…
The BlackBasta ransomware / cyber extortion gang is behind the recent cyber attack that resulted in the temporary shutdown of…
The Australian privacy commissioner warned the Australian public that third-party suppliers serve as “a real weak spot” to safeguard customer…
The alignment between security teams and executive management is crucial. However, a significant communication gap within organizations is increasingly becoming…
The Damselfly Advanced Persistent Threat (APT) group, also known as APT42, has been actively utilizing custom backdoor variants, NiceCurl and…











