No “Apple magic” as 11% of macOS detections last year came from malware
We’re going to let you in on a little cybersecurity secret… There’s malware on Mac computers. There pretty much always has been. As revealed in…
We’re going to let you in on a little cybersecurity secret… There’s malware on Mac computers. There pretty much always has been. As revealed in…
Mar 05, 2024NewsroomAttack Surface / Exposure Management Startups and scales-ups are often cloud-first organizations and rarely have sprawling legacy on-prem environments. Likewise, knowing the agility…
The European Commission (EC) approved the Project of Common European Interest – Cloud Infrastructure and Services (IPCEI-CIS) programme in late 2023. In this programme, around…
Watch out for the new CHAVECLOAK banking Trojan as it spreads its infection through SMS phishing (SMishing), phishing emails, and compromised websites. Cybersecurity researchers at…
A threat actor specializing in establishing initial access to target organizations’ computer systems and networks is using booby-trapped email attachments to steal employees’ NTLM hashes.…
Mar 05, 2024NewsroomEmail Security / Network Security The threat actor known as TA577 has been observed using ZIP archive attachments in phishing emails with an…
The topic of whether or not it would be appropriate to enact a legal ban on making or facilitating a ransomware payment is once again…
In a concerning development, it has been alleged that the database of La Bonne Alternance, a platform assisting candidates in work-study training, has been leaked.…
The latest financial results from PC server manufacturers show sales have been boosted by demand for artificial intelligence (AI)-accelerated servers. There is pent-up demand as…
In today’s digital landscape, the threat of cyberattacks looms large, with organizations facing increasingly sophisticated threats. According to research conducted by STX Next, a global…
Experts disclosed two severe flaws in JetBrains TeamCity On-Premises software Pierluigi Paganini March 05, 2024 Two new security flaws in JetBrains TeamCity On-Premises software can…
Threat actors known as CACTUS orchestrated a sophisticated attack on two companies simultaneously, exploiting a software vulnerability within 24 hours of its disclosure. This coordinated…