Don’t fall for the “Donate to help children in Ukraine” scam
Earlier this week, we spotted a Microsoft sign-in phish that appeared to be taking advantage of the Ukraine crisis in...
Earlier this week, we spotted a Microsoft sign-in phish that appeared to be taking advantage of the Ukraine crisis in...
Cisco fixed critical flaws in its Expressway Series and TelePresence Video Communication Server (VCS) unified communications products. Cisco announced security...
As digital transformation is advancing and automation is becoming an essential component of modern enterprises, collaboration between humans and machines...
Researchers observed a spike in the attacks against Ukrainian WordPress sites since the beginning of the military invasion of the...
Russia’s continued, weeklong invasion of Ukraine has altered the landscape of cybersecurity threats facing organizations both near and far from...
Russia considers it legitimate to invade another country but warns it will consider cyberattacks on its satellites an act of...
Researchers from JFrog’s Security Research team discovered five vulnerabilities in the PJSIP open-source multimedia communication library. Researchers from JFrog’s Security...
Discover 5 key security components to review and how to leverage a cloud native security platform with Mick McCluney (Trend...
In this final part, we discuss the countries most affected by SMS PVA services as well as lay out several...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
A spear-phishing campaign, tracked as Asylum Ambuscade, targets European government personnel aiding Ukrainian refugees. Researchers from cybersecurity firm Proofpoint uncovered...
On March 1, US President Joe Biden gave his first State of the Union Address (SOTU) speech to Congress. In...
Chipmaker giant Nvidia confirmed a data breach after the recently disclosed security incident, proprietary information stolen. The chipmaker giant Nvidia...
The massive operation launched by the Anonymous collective against Russia for its illegitimate invasion continues. The popular collective Anonymous, and...
The Chrome team announced the promotion of Chrome 99 to the stable channel for Windows, Mac and Linux on March...
I have long said that Deepfakes missed the boat on being stealthy, believable pieces of footage able to turn the...
Meta says it has detected and removed two disinformation campaigns regarding the current Russia-Ukraine war. These campaigns, it says, were...
Toyota suspended the operation of 28 lines at 14 plants in Japan on Tuesday, March 1, after a cyberattack on...
A Ukrainian researcher leaked the source for the Conti ransomware and components for the control panels. Recently a Ukrainian researcher leaked...
Executive summary On February 24, 2022, Avast Threat Research published a tweet announcing the discovery of new Golang ransomware, which...
IsaacWiper, a new data wiper was used against an unnamed Ukrainian government network after Russia’s invasion of Ukraine. ESET researchers...
On February 27, an individual associated with the Conti ransomware group started leaking a treasure trove of data beginning with...
Daxin is the most advanced backdoor in the arsenal of China-linked threat actors designed to avoid the detection of sophisticated...
Data breaches are one of the most reported cyberattacks against businesses—regardless of size and industry. And while this has highlighted...