The US cybersecurity agency CISA has published new guidance to help healthcare and public health organizations understand the cyber threats…
The Lumma information-stealing malware is now using an interesting tactic to evade detection by security software – the measuring of…
New research by Outpost24 has revealed that malware developers are using sandbox evasion techniques to avoid exposing malicious behaviour inside a…
From installing firewalls to choosing secure hosting, every aspect is crucial in online business. Are you in the process of…
Morgan Stanley has agreed to a $6.5 million settlement over insecurely disposing of hardware containing unencrypted personal information. Through negligent…
Russia-linked APT29 group exploited WinRAR 0day in attacks against embassies Pierluigi Paganini November 20, 2023 Russia-linked cyberespionage group APT29 has…
Gamaredon (aka Primitive Bear, ACTINIUM, and Shuckworm) stands out in Russian espionage by exclusively targeting Ukrainian entities. Unusually evident, it…
A ransomware attack targeted Yamaha Motor Co., Ltd., resulting in a partial disclosure of the personal information maintained by the…
A survey of 280 software engineers conducted in October has reported that over half (53%) suspected that malpractices were occuring…
Microsoft snapped up Sam Altman and another architect of OpenAI for a new venture after their sudden departures shocked the…
A high-severity Remote Code Execution (RCE) flaw in Splunk Enterprise has been discovered, enabling an attacker to upload malicious files. Versions…
Threat intelligence (TI) is critical to organizations’ cybersecurity infrastructure, allowing them to keep track of the evolving threat landscape and…










