Anyone who spends time online these days will either interact directly with deepfakes or come across discussions about them –…
Cybercriminals have been increasingly using a new phishing-as-a-service (PhaaS) platform named ‘Tycoon 2FA’ to target Microsoft 365 and Gmail accounts and…
Strelastealer malware has been found to be distributed in large-scale campaigns that have currently impacted over 100 organizations across the…
Hackers have reportedly gained unauthorized access to credit card information from approximately 15,000 Roku accounts, according to a disclosure from…
This week on the Lock and Code podcast… Few words apply as broadly to the public—yet mean as little—as “home…
OpenVPN has released their new version 2.6.10 in which there have been several bug fixes and improvements specifically to the…
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light…
Softline Group, a major IT solutions provider, has confirmed the suspension of access to cloud products offered by Microsoft, Amazon,…
By Zac Amos, Features Editor, ReHack Zero trust has gained significant attention as an effective approach to secure digital assets….
In October 2023, The British Library was attacked by the Rhysida ransomware gang in a devastating cyberattack. The library, a…
In her opening keynote at the KubeCon and CloudNativeCon conference in Paris, Priyanka Sharma, executive director of the Cloud Native…
Iran-Linked APT TA450 embeds malicious links in PDF attachments Pierluigi Paganini March 25, 2024 In recent campaigns, Iran-linked APT group…











