The Data Protection and Digital Information (No. 2) Bill, or DPDI, is set to reshape the UK’s data protection framework….
The new Australian Cyber Security Strategy 2023 stands out as a pivotal roadmap, signifying the nation’s commitment to fortifying its…
In the ever-evolving realm of cybersecurity, Microsoft Threat Intelligence has uncovered a sophisticated supply chain attack orchestrated by the North…
Kubernetes is an open-source container orchestration platform that automates the deployment, scaling, and management of containerized applications. Besides this, hackers…
Nov 23, 2023NewsroomVulnerability / Cyber Threat An active malware campaign is leveraging two zero-day vulnerabilities with remote code execution (RCE)…
North Korea-backed threat actors are increasingly targeting software supply chains to attack organisations on a global basis, and becoming far…
NSC Technologies discovered that a recent cyberattack had enabled an unauthorized third party to access the firm’s IT network, and…
With the release of Mozilla Firefox 120, 10 vulnerabilities are patched, including six ‘High Severity’ issues and two moderate and…
Microsoft Windows Hello Fingerprint authentication was evaluated for security over its fingerprint sensors embedded in laptops. This led to the…
Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals. But the bad…
Researchers noticed developments in the sophisticated, multi-component malware dubbed WailingCrab, especially those pertaining to its C2 communication techniques, which included…
A new high-severity vulnerability has been discovered in multiple Cisco products, which could potentially allow HTTP/2 Rapid Reset Attack. This…











