Check Point Research has exposed a recent wave of cyberattacks utilizing the infamous Agent Tesla malware. This campaign targeted organizations in…
Operational Technology (OT) refers to the hardware and software used to change, monitor, or control the enterprise’s physical devices, processes,…
Friends and colleagues have paid tribute to Ross Anderson, professor of security engineering at Cambridge University and Edinburgh University, and…
Cybercriminals are increasingly exploiting YouTube, a platform beloved by millions, to produce sophisticated malware attacks. These threat actors, leveraging the…
UK-based cloud services provider Civo claims its offer to abolish all data egress fees for its customers goes above and…
A new claim has surfaced on the internet regarding a zero-day exploit that targets the Windows operating system. This exploit,…
ReversingLabs has uncovered a series of Visual Studio Code (VS Code) extensions designed to transfer sensitive information from unsuspecting users….
The latest research from Boomi, conducted by Forrester, has reported that IT leaders expect their cloud costs will exceed budgets. The…
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light…
A new ransomware variant is targeting VMware ESXi servers, a popular virtualization platform used by hosting providers worldwide. Dubbed “SEXi”…
It’s no secret that the gender gap in cybersecurity is a worldwide issue, with women currently representing only 24% of…
“That’s not nice, and it’s not a good norm,” says Schneider. She says that much of the US government’s slow…











