Nigerian Police dismantle cybercrime recruitment, mentoring hub
The Nigerian Police Form has arrested six suspects and dismantled a mentoring hub linked to cybercrime activities, including business email...
The Nigerian Police Form has arrested six suspects and dismantled a mentoring hub linked to cybercrime activities, including business email...
A sophisticated cross-platform malware platform named StripedFly flew under the radar of cybersecurity researchers for five years, infecting over a...
Microsoft has published a detailed profile of a native English-speaking threat actor with advanced social engineering capabilities it tracks as...
The Russian APT28 hacking group (aka 'Strontium' or 'Fancy Bear') has been targeting government entities, businesses, universities, research institutes, and...
Law enforcers should start building their knowledge and assessing the potential impact of quantum computing technologies, to ensure they can...
As generative AI rapidly evolves, one of the biggest risks that is being discussed is the potential for the technology...
UK lawmakers have launched an inquiry into the cyber-resilience of critical national infrastructure (CNI), claiming the country is the third...
A leading US cybersecurity agency has published a new set of online resources designed to help IT security leaders in the...
In an update to previous reports, Kaspersky’s Global Research and Analysis Team (GReAT) has disclosed new insights into the notorious...
New cybersecurity rules and regulations offer security leaders a great opportunity to elevate their role at their organizations, boosting security...
Leading CISOs have offered best practices for security leaders on how to manage cyber risks effectively during the ISC2 Security...
Ahead of the UK's AI Safety Summit, new research has revealed significant concerns among UK IT professionals regarding the deployment of...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info1e -- platformAffected 1E Platform versions have a Blind SQL Injection vulnerability...
A group of academics has devised a novel side-channel attack dubbed iLeakage that exploits a weakness in the A- and...
Cloudflare on Thursday said it mitigated thousands of hyper-volumetric HTTP distributed denial-of-service (DDoS) attacks that exploited a recently disclosed flaw...
The prolific threat actor known as Scattered Spider has been observed impersonating newly hired employees in targeted firms as a...
Users of Mirth Connect, an open-source data integration platform from NextGen HealthCare, are being urged to update to the latest...
While cyberattacks on websites receive much attention, there are often unaddressed risks that can lead to businesses facing lawsuits and...
The Iranian threat actor known as Tortoiseshell has been attributed to a new wave of watering hole attacks that are...
A relatively new threat actor known as YoroTrooper is likely made of operators originating from Kazakhstan. The assessment, which comes...
VMware issued security updates to fix a critical vCenter Server vulnerability that can be exploited to gain remote code execution attacks...
The Winter Vivern Russian hacking group has been exploiting a Roundcube Webmail zero-day in attacks targeting European government entities and...
As the world moves steadily to becoming more and more digital, organizations worldwide become increasingly dependent on IT systems to...
Chile's Grupo GTD warns that a cyberattack has impacted its Infrastructure as a Service (IaaS) platform, disrupting online services. Grupo...