A new phishing tactic was discovered that takes advantage of Google Accelerated Mobile Pages (AMP), which is known to be…
In today’s ever-evolving landscape, organisations recognise that software risk directly impacts their business. To effectively handle this risk, the focus…
The United States Director of the Cybersecurity and Infrastructure Security Agency (CISA) released a warning on Friday about the active…
Cloud object storage at up to 20% of the cost of that provided by the big public cloud providers. That’s…
The potentially unaware C2P entities that serve as legit businesses could be exploited easily by threat actors for attack campaigns…
In Summary Report by Halcyon, a Texas-based cybersecurity startup. Cloudzy is registered in the USA but based in Iran. Cloudzy…
As tech ecosystems become more interconnected and data is exchanged more frequently, the complexity of the cyber landscape has significantly…
VALIC Retirement Services Company is among the latest victims of the MOVEit File Transfer cyber attack. The VALIC cyber attack…
Vast Data aims to get vaster with the launch of the Vast Data Platform that will provide customers with AI/ML-focused…
The rapid growth in generative AI tech is dramatically changing the complete threat scenario since threat actors actively exploit this…
Shareholders of HUB Cyber Security Ltd. has filed a class action against the company, alleging misleading statements related to its…
Splunk has discovered a vulnerability that allows unauthenticated log injection, which could enable malicious actors to run harmful code on…











