A set of 21 newly discovered vulnerabilities impact Sierra OT/IoT routers and threaten critical infrastructure with remote code execution, unauthorized…
In a digital world that is constantly evolving, we often find ourselves discussing online privacy and security. One of the…
A 40-year-old Russian national, Vladimir Dunaev, pleaded guilty for developing and deploying Trickbot malware. Trickbot, a suite of malware tools,…
Starting May 2024, residents of the United Kingdom can breathe a sigh of relief, as social media platforms operating in…
Offensive Security releases Kali Linux 2023.4, the latest version of the popular operating system, as 2023 comes to a close…
In recent years, the prevalence of cloud computing has revolutionized the way businesses operate, offering scalability, flexibility, and cost-efficiency. However,…
In a recent wave of cyberattacks on Israeli organizations, the notorious Cyber Toufan Team hacker group has once again made…
The notorious LockBit ransomware gang has claimed responsibility for a cyberattack on the Metropolitan Area Planning Council (MAPC), which serves…
By Craig Burland, CISO, Inversion6 You’ve been laser focused on driving cybersecurity risk out of your organization and made great…
The Traffic and Criminal Software (TraCS) of Florida has reportedly fallen victim to a cyberattack by the notorious ALPHV ransomware…
UEFI vulnerabilities pose significant threats, enabling hackers to execute malicious code during system boot, bypass security measures, and establish persistent…
Jack Viljoen, Head of Prodinity Cyber Solutions, provides a cyber safety 101 to avoid vendor-related cyber-attacks. By Jack Viljoen, Prodinity…











