By Natasha Gupta, Senior Security Solutions Manager, Synopsys Software Integrity Group As organizations embrace digital transformation efforts to speed up…
Sharing information about cyber attacks provides several benefits to individuals, organizations, and the broader cybersecurity community. Here are some key…
Here’s a look at the most interesting products from the past week, featuring releases from BackBox, ProcessUnity, SentinelOne, and Vade….
Feb 02, 2024NewsroomData Breach / Cloud Security Cloudflare has revealed that it was the target of a likely nation-state attack…
Several chunks of data belonging to Hewlett Packard Enterprise (HPE) are purportedly up for sale on the dark web. The…
The notorious LockBit ransomware group has claimed two more victims, adding to their dark web portal – Talon International Inc…
DDoS attack trends for the second half of 2023 reveal alarming developments in their scale and sophistication, according to Gcore….
69% of identity-based incidents involved malicious logins from suspicious infrastructure, which are hosting providers or proxies that aren’t expected for…
In this video on David Bombal’s podcast, I talk through the AI tooling I spent 2023 building. How I captured…
Free unofficial patches are available for a new Windows zero-day flaw dubbed EventLogCrasher that lets attackers remotely crash the Event Log…
The Computer Emergency Response Team in Ukraine (CERT-UA) is warning about a PurpleFox malware campaign that has infected at least…
Tasmania is to get a presence on the Internet Association of Australia’s (IAA) national network of internet exchanges, with TAS-IX…











