Mandiant Unveils Russian GRU’s Cyber Playbook Against Ukraine
Drawing on its tracking of Russia-backed disruptive operations against Ukraine since the country’s invasion of its neighbor in February 2022,...
Drawing on its tracking of Russia-backed disruptive operations against Ukraine since the country’s invasion of its neighbor in February 2022,...
The White House has published a plan for the implementation of the US National Cybersecurity Strategy, which was introduced in...
This year could be another record breaker for data compromise following 951 publicly reported incidents in the second quarter, a...
A leading UK security agency has revealed several approaches that could reduce or eliminate the need for organizations to run...
The UK’s financial services regulator has warned banks that it will be watching closely what steps they put in place...
Global financial services organizations have lost over $32bn in downtime since 2018 due to ransomware breaches, a new report has...
A new version of the Common Vulnerability Scoring System (CVSS 4.0) has been unveiled publicly by the Forum of Incident...
A new threat actor group has been observed conducting a series of cyber-attacks targeting government entities, military organizations and civilian...
Windows users have been targeted again by the sophisticated malware known as LokiBot, which is spreading through malicious Office documents. According...
A generative AI tool, WormGPT, has emerged as a powerful weapon in the hands of cyber-criminals, specifically for launching business...
Trend Micro has discovered a sample of Shadowpad, a sophisticated backdoor used by various Chinese-sponsored threat actors, in an application...
A malware variant targeting the macOS community has been recently identified in the wild, highlighting the ongoing evolution and adaptability...
The rapid advancement in technology persists, and alongside this progress, the risk of cyber threats continues to escalate. Bolstering your...
Beware as ransomware actors continue to grab headlines! On one hand, the notorious BlackCat ransomware group has been observed propagating...
Another ransomware got Linux-ed! Threat actors behind the Akira ransomware have reportedly widened their range of targets by launching the...
In a recent development highlighting the persistent threat of SQL injection vulnerabilities, critical flaws have been discovered in Gentoo Soko....
Hundreds of banking institutions from the U.S., the U.K, and the DACH region are being targeted in an ongoing malvertising...
Phishing Attacks Phishing attacks are among the most common methods used by cybercriminals to steal personal information, financial data, and...
How long before you patch a publicly disclosed vulnerability? In a recent incident, threat actors from China successfully exploited a 17-year-old...
Apple on Wednesday resolved three zero-day vulnerabilities that were being actively exploited in attacks aimed at installing the TriangleDB spyware...
Researchers have issued warnings about an ongoing Tsunami DDoS botnet campaign that specifically targets unprotected Linux SSH servers. This botnet...
ASUS has addressed both ‘Critical’ and ‘High’ rated security vulnerabilities in the latest round of updates for multiple router models....
U.S. power and electronics company Eaton patched a sensitive security flaw that enabled an unauthenticated user to remotely access a...
No ifs no buts! Disable HTTP and HTTPS traffic to MOVEit Transfer, said the maker of the file-sharing software after...