RailTel Corporation of India Ltd., a prominent public sector enterprise providing broadband and VPN services, is allegedly facing a significant…
Zloader, also known as Terdot, DELoader, or Silent Night, is a modular trojan that reappeared after nearly two years of absence…
Hackers use supply chain attacks to breach a target by gaining access to and taking advantage of weaknesses in the…
While a valuable tool in the cybersecurity toolkit, MFA is not immune to weaknesses. Read the “MFA Misconceptions” whitepaper to…
For financial gain, hackers exploit ransomware through which they encrypt victims’ data and then demand a ransom payment in exchange…
In the murky depths of the digital world lurks a cunning predator – Parrot TDS, a cyber campaign that has…
Global Sanctions Imposed on Russian-Linked REVIL Ransomware Operator Governments of Australia, UK, and the United States have jointly sanctioned Alexander…
Security BSides Security BSides offers attendees an opportunity to engage and present their ideas actively. Characterized by its intensity, these…
Jan 24, 2024NewsroomVulnerability / Endpoint Security A critical security flaw has been disclosed in Fortra’s GoAnywhere Managed File Transfer (MFT)…
The Hunters ransomware group has claimed to have launched a cyberattack on Double Eagle Energy Holdings IV, LLC, a prominent…
In the ever-evolving landscape of cybersecurity, organizations face a multitude of threats that can compromise their sensitive data and operations….
Whether we’d like to admit it to ourselves or not, all humans harbor subconscious biases that powerfully influence our behavior….











