John Hanley of IBM Security shares 4 key findings from the highly acclaimed annual Cost of a Data Breach Report…
Threat actors engage in cyberespionage to gain the following advantages:- Strategic Political Economic Military Hackers do so by stealing the…
The concept of DCAP solutions was introduced by Gartner experts, as it was clear, that without such solutions information security…
A new phishing campaign targeting Instagram users has been discovered, which uses several different techniques to lure victims into phishing…
In the dynamic realm of IT, HCL Technologies, the Noida-based juggernaut, recently found itself navigating choppy digital waters. The revelation…
Dec 21, 2023NewsroomDark Web / Cybercrime German law enforcement has announced the disruption of a dark web platform called Kingdom…
Google has released urgent upgrades to fix the Chrome zero-day high-severity vulnerability that has been widely exploited, which could lead…
Among the myriad of new ransomware groups on the dark web, a noteworthy addition has surfaced – the WereWolves ransomware…
On December 20, 2023, Rosvodokanal, the Russian water utility firm, experienced a alleged cyberattack perpetrated by the Ukrainian hacker group…
Data leak exposes users of car-sharing service Blink Mobility Pierluigi Paganini December 21, 2023 More than 22,000 users of Blink…
Dec 21, 2023NewsroomVulnerability / Phishing Attack Attackers are weaponizing an old Microsoft Office vulnerability as part of phishing campaigns to…
The notorious 8BASE ransomware group has allegedly targeted four new victims, adding to the growing list of organizations falling prey…











