A flaw was discovered in Progress MOVEit Transfer, a popular third-party online transfer application. By exploiting the flaw, attackers compromised…
Threat intelligence infrastructure startup Cyware on Thursday announced it had secured $30 million in new financing alongside plans to take…
Criminal IP, an OSINT-based CTI search engine provided by AI SPERA, has recently announced the introduction of a bug bounty…
AI Tools have become extremely popular in the software industry and are currently in the initial phase of adoption by…
By Luca Rognoni, Chief Security Officer and Co-Founder, YEO Messaging Cyber threat landscape has dramatically expanded in recent years due…
Cybersecurity researchers at FortiGuard Labs recently found an unseen infostealer dubbed “ThirdEye” that is mainly crafted to steal several information…
By Bob Maley, CSO at Black Kite After last year’s good fight against ransomware gangs, CISOs thought they won. Overall…
[ This article was originally published here ] Executive summary is a technique that hackers use to gain unauthorized access…
Jun 29, 2023Ravie Lakshmanan The Iranian state-sponsored group dubbed MuddyWater has been attributed to a previously unseen command-and-control (C2) framework…
ESG [Environment, Social and Governance] is everyone’s favourite new acronym, working as a catch-them-all for climate action, worker rights, social…
Ann Dunkin is CIO at the US Department of Energy (DOE). Among her responsibilities, she heads IT and oversees cybersecurity….
MITRE shared today this year’s list of the top 25 most dangerous weaknesses plaguing software during the previous two years….











