The UK Cyber Governance Code of Practice (CGCP), published in April by the Department for Science, Innovation and Technology, is…
A significant security vulnerability has been discovered in BeyondTrust’s Privilege Management for Windows solution, allowing local authenticated attackers to escalate…
The Contagious Interview campaign conducted by the Lazarus Group continues to expand its capabilities. We have observed an exponential evolution…
Jul 30, 2025Ravie LakshmananEndpoint Security / Cyber Espionage Chinese companies linked to the state-sponsored hacking group known as Silk Typhoon…
The cybersecurity landscape has witnessed a significant surge in information-stealing malware, with Lumma emerging as one of the most prevalent…
A critical security vulnerability has been discovered in the popular “Alone” WordPress theme that allows unauthenticated attackers to execute arbitrary…
Cybercriminals are escalating their tactics, moving beyond traditional data encryption to employ a more aggressive approach known as quadruple extortion….
US software developers specialising in artificial intelligence (AI) and machine learning (ML) engineering appear to be earning significantly more than…
During a Senate Homeland Security and Governmental Affairs Committee hearing earlier this month in which lawmakers considered if Sean Plankey…
Joint international advisory warns of evolving social engineering tactics and new DragonForce ransomware deployment targeting commercial facilities A collaboration of…
The new Gunra group has expanded its attack surface beyond Windows PCs by releasing a Linux version of their virus,…
It’s been slightly more than seven years since GDPR came into force – a key moment that reshaped how organisations…











