Feb 09, 2024NewsroomEndpoint Security / Cryptocurrency Sixty-one banking institutions, all of them originating from Brazil, are the target of a…
Fujitsu’s decision to stop bidding on public sector contracts until the conclusion of the public inquiry into the Post Office…
Connecticut College has recently revealed a significant data breach incident, prompting swift and proactive measures to address the incident and…
The cyber war saga between the notorious R00TK1T hacker group and Malaysia seems to have taken a temporary ceasefire, leaving…
Fortinet has issued a warning regarding a critical out-of-bounds write vulnerability in FortiOS. Remote attackers can exploit this vulnerability to…
One of the biggest challenges of digital technology today is around security systems and data. In response to this, sophisticated…
Mandiant and VMware recently uncovered a sophisticated cyber espionage campaign. The attackers, a Chinese group identified as UNC3886, leveraged a…
The Trojan.MAC.RustDoor backdoor is potentially linked to the notorious BlackBasta and (ALPHV/BlackCat) ransomware operators. Bitdefender researchers have discovered a new…
97% of office workers across the UK and US trust their cybersecurity team’s ability to prevent or minimize damage from…
Introduction The modern software supply chain represents an ever-evolving threat landscape, with each package added to the manifest introducing new…
Joen Meier Olsen, senior manager of strategy advisers in EMEA for Apptio, says: “The hybrid cloud conversation in the Nordics focuses more…
Ivanti warns of a new auth bypass flaw in its Connect Secure, Policy Secure, and ZTA gateway devices Pierluigi Paganini…











