CISA Advisory of Top 42 Vulnerabilities Frequently Exploited
The Cybersecurity and Infrastructure Security Agency (CISA) has published a report which was co-authored by the NSA, FBI, and the FYEY (Five Eyes) from different…
The Cybersecurity and Infrastructure Security Agency (CISA) has published a report which was co-authored by the NSA, FBI, and the FYEY (Five Eyes) from different…
Cybersecurity researchers have discovered a new bunch of malicious packages on the npm package registry that are designed to exfiltrate sensitive developer information. Software supply…
Google is making it easier for users to remove personal contact information and personal, non-consensual explicit imagery from Google search results. “Of course, removing content…
In what appears to be a targeted cyber attack, the NDT SEC hacking group has reportedly aimed at Delta Electronics’ website in Thailand. Despite the…
Threat actors rely on the ‘versioning’ technique to evade malware detections of malicious code uploaded to the Google Play Store. Google Cybersecurity Action Team (GCAT)…
Over the past couple of years, the cost of living in the UK has increased significantly. The annual rate of inflation reached 11.1% in October…
Exploitation of the recently disclosed Ivanti Endpoint Manager Mobile (EPMM) vulnerability has started to pick up, just as the vendor announced the discovery of a…
By Ruoting Sun, Vice President of Products, Secureframe The rapid rise of cloud-first organizations has revolutionized the way businesses operate. Yet with increased reliance on…
The continued onslaught of phishing attacks, ransomware deployment, and other exploitation is forcing the community to pay closer attention to early identification, as well as…
Two and a quarter years after President Biden signed an Executive Order (EO) to harden the US’ cyber security defences in the wake of high-profile…
Government agencies in Australia, Canada, New Zealand, the UK, and the US have published a list of the software vulnerabilities that were most frequently exploited…
By Mark Guntrip, Senior Director of Cybersecurity Strategy, Menlo Security A new breed of attacker has emerged, one that has learned to weaponize the web…