“Shift-left” is a familiar concept to CISOs and security practitioners across the globe. A term coined to promote the integration…
Supply chain security has become an increasingly critical concern for businesses and governments alike. In today’s interconnected digital economy, supply…
CISA has added Mitel MiCollab (CVE-2024-41713, CVE-2024-55550) and Oracle WebLogic Server (CVE-2020-2883) vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog….
2024 had its fair share of high-profile cyber attacks, with companies as big as Dell and TicketMaster falling victim to…
Demand for generative artificial intelligence (AI) services is being cited as the reason why spending on datacentre hardware and software…
A new security advisory has been released regarding several vulnerabilities in SonicWall’s SonicOS software, which could enable attackers to bypass…
SUMMARY Sophisticated Scam in the Middle East: Cybercriminals are posing as government officials to carry out refund scams, using remote…
Finland’s fast-expanding defence sector is witnessing a surge in tech startups chasing new business opportunities on the back of the…
Researchers have identified critical vulnerabilities in Illumina iSeq 100 DNA sequencers due to the absence of essential security features such…
The distinction between nation-state actors and organized cybercriminals is becoming increasingly blurred. Both groups now leverage similar tactics, techniques, and…
Jan 08, 2025Ravie LakshmananMalware / Vulnerability A Mirai botnet variant has been found exploiting a newly disclosed security flaw impacting…
Washington State Attorney General Bob Ferguson has filed a consumer protection lawsuit against T-Mobile, accusing the telecommunications giant of failing…