Approximately 75% of all recorded cyber security breaches that originated through a third-party occurred after other entities in the victim’s…
The LockBit ransomware gang is once again conducting attacks, using updated encryptors with ransom notes linking to new servers after…
The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Health and Human…
By Zac Amos, Features Editor, ReHack Cyberattacks are a growing problem worldwide as they can cause significant damage to any…
Malicious hackers are targeting people in the cryptocurrency space in attacks that start with a link added to the target’s…
To raise awareness of the ALPHV Blackcat ransomware as a service (RaaS) that targets the US healthcare industry, the FBI, CISA,…
28 Feb Freelance TV Presenter Paid To Pose As A Crypto CEO. Millions Lost In The Hyperverse Scam. This week…
It was just a little over a year ago that the Rhadamanthys stealer was first publicly seen distributed via malicious…
The Public Accounts Committee (PAC) has concerns that HM Revenue & Customs’ (HMRC) “tough approach” to enforcing the IR35 tax…
Unmasking 2024’s Email Security Landscape Pierluigi Paganini February 28, 2024 Analyzing the Email Security Landscape and exploring Emerging Threats and…
Epic Games said they found zero evidence of a cyberattack or data theft after the Mogilevich extortion group claimed to…
Threat actors hijack routers to gain unauthorized access to network traffic. This enables them to monitor, manipulate, or intercept sensitive…











