Mar 01, 2024NewsroomPhishing Kit / Cryptocurrency A novel phishing kit has been observed impersonating the login pages of well-known cryptocurrency…
Hacker groups recruit pentesters because they possess valuable skills in identifying and exploiting vulnerabilities. This aligns with the offensive capabilities…
Continuing on from their popular webinar series, Advanced Cyber Defence Systems (ACDS) are taking their ‘Think Like a Hacker’ series…
Entering the world of cryptocurrency might seem straightforward, but ensuring the security of your crypto funds is crucial. Understanding the…
The American authorities have warned users of Ubiquiti’s EdgeRouter products that they may be at risk of being targeted by…
A new Linux variant of Bifrost, dubbed Bifrose, was observed exhibiting a creative way to avoid detection, such as using a deceptive domain…
CutOut.Pro, an AI-powered photo and video editing platform, has reportedly suffered a data breach, exposing personal information belonging to over…
Mar 01, 2024NewsroomLinux / Cyber Threat Cybersecurity researchers have discovered a new Linux variant of a remote access trojan (RAT)…
As flash storage has evolved over the past 10 years, capacity and density have increased, but endurance and performance have…
Crooks stole €15 Million from European retail company Pepco Pierluigi Paganini March 01, 2024 Crooks stole €15.5 million from the…
Purple teaming in cybersecurity refers to a collaborative approach that aims to enhance an organisation’s security posture by integrating the…
The Common Weakness Enumeration (CWE) project, a cornerstone in the cybersecurity landscape, has unveiled its latest iteration, version 4.14, introducing…











