The cybersecurity landscape faces a new threat with the emergence of ‘darcula,’ a Phishing-as-a-Service (PhaaS) platform. This sophisticated service enables…
Veracode, a leading provider in the cybersecurity space, has officially announced its acquisition of Longbow Security. This strategic move is…
A critical vulnerability has been discovered within the XZ Utils library (a command line tool for compressing and decompressing XZ…
A critical security flaw, identified as CVE-2023-50969, has recently been discovered in Imperva SecureSphere, a popular on-premise Web Application Firewall…
A backdoor was recently discovered in the xz-utils package versions 5.6.0 to 5.6.1, shocking the Linux community. This poses a…
Apr 02, 2024NewsroomMalvertising / Threat Intelligence The threat actor known as TA558 has been attributed to a new massive phishing…
In the dynamic realm of digital business operations, identity security emerges as a vital element of organisational resilience. “Investing in…
Cloud Active Defense is an open-source solution that integrates decoys into cloud infrastructure. It creates a dilemma for attackers: risk…
There will always be a natural tension between cybersecurity teams and developers. After all, it’s the developer’s role to “develop.”…
The Open Web Application Security Project (OWASP) Foundation disclosed a significant data breach. The breach, which was discovered in late…
Only 3% of organizations across the globe have the ‘mature’ level of readiness needed to be resilient against modern cybersecurity…
The Indian government says it rescued and repatriated 250 citizens who sought jobs in Cambodia, only to be forced into conducting…











