A new report from Cofense reveals that cybercriminals are blending phishing and malware, including Muck Stealer, Info Stealer, ConnectWise RAT,…
The Ministry of Defence (MoD) has selected Google Cloud to provide it with sovereign cloud capabilities in a deal worth…
Cybercrime and online scams have officially overtaken traditional threats as the primary regional security concern for the Association of Southeast…
A critical security vulnerability has been discovered in the popular Axios HTTP client library that allows attackers to crash Node.js…
Backdoor malware is a covert type of malicious software designed to bypass standard authentication mechanisms and provide persistent, unauthorized access…
Cloud block storage allows organisations to run applications that depend on high throughput and low latency in the cloud. The…
UK train operator LNER (London North Eastern Railway) discloses a data breach Pierluigi Paganini September 12, 2025 LNER warns of…
Samsung has patched a remote code execution vulnerability that was exploited in zero-day attacks targeting its Android devices. Tracked as…
A new, sophisticated malware campaign has been uncovered that leverages Microsoft’s Azure Functions for its command-and-control (C2) infrastructure, a novel…
Recent threat campaigns have revealed an evolving use of BAT-based loaders to deliver Remote Access Trojans (RATs), including XWorm and…
The security landscape for cloud-native applications is undergoing a profound transformation. Containers, Kubernetes, and serverless technologies are now the default…
Fujitsu’s Horizon system continues to produce erratic figures in branch accounts, which the Post Office can’t explain, with millions of…











