Using a zero-day exploit in Microsoft Outlook (tracked as CVE-2023-23397), Fighting Ursa Aka APT28 targets at least 30 companies across 14 countries…
December 8, 2023 – Meta’s Project Llama aims to help developers filter out specific items that might cause their AI…
The University of Wollongong has become the latest victim of a data breach, as confirmed by university officials. In a…
CISA and ENISA signed a Working Arrangement to enhance cooperation Pierluigi Paganini December 11, 2023 ENISA has signed a Working…
With its innovative feature for generating reliable Vulnerability Exploitability eXchange (VEX) documents, Kubescape became the first open-source project to provide…
Dec 11, 2023NewsroomData Security / Mobile Security Cybersecurity researchers have discovered 18 malicious loan apps for Android on the Google…
LivaNova PLC, a prominent US-based healthcare device manufacturer specializing in neuromodulation devices and cardiopulmonary products, has allegedly fallen victim to…
McDonald’s Hacked or so have three hacker groups—Lulzsec, ByteVigilante, and Moroccan Black Cyber Army — claimed. However, scepticism looms within…
1.) The ALPHV ransomware gang’s website, which provides information leaks and negotiation details, has been inaccessible for several hours. Telegram…
In the intricate web of our interconnected world, the Domain Name System (DNS) stands as a linchpin, directing users to…
In an era dominated by digital advancements, the importance of cybersecurity cannot be overstated. Cybersecurity audits play a pivotal role…
As an IT professional, you understand the value of automation, and like many IT experts, you may approach it with…










