Networking technology giant Cisco has become the latest supporter of Manchester’s growing Digital Security Hub (DiSH) cyber security accelerator, launching…
We are glad to announce our new functionality for defining Scope! HackerOne’s Vulnerability Taxonomy now includes Severity, Weakness type, and…
A former IT security analyst who exploited an opportunistic ransomware attack to impersonate the attackers and conduct his own, secondary…
A new variant of Mirai botnet thriving on several vulnerabilities has been targeting Linux-based devices. The three found vulnerabilities analyzed…
The BlackByte ransomware group has claimed responsibility for the cyber attack on the City of Augusta, ending days of speculation…
When he’s not reverse engineering malware, Marcus Hutchins (aka @MalwareTechBlog) can be found surfing, partying, or traveling. That’s to be…
The US and global cybersecurity agencies have issued a joint advisory to bring attention to the activities of “Volt Typhoon,”…
Proofpoint’s security researchers have identified indications of sophisticated threat actors focusing their attention on small and medium-sized enterprises and service…
There’s a little bit of a trap sometimes that can arise in the way that humans understand and process language….
Listen up new and aspiring hackers, we’ve teamed up with our friends at PortSwigger to offer free 90-day licenses for…
It’s no secret that the UK is facing a huge fraud problem. Economic crime is thought to cost the UK…
Weeks after the first update on the Norton Healthcare cyber attack came, the ALPHV/BlackCat ransomware group disclosed that it was…











