Albabat Ransomware: Evolving Threats Targeting Linux and macOS
The Albabat ransomware has undergone significant evolution, expanding its reach to target Linux and macOS systems alongside Microsoft Windows. New...
The Albabat ransomware has undergone significant evolution, expanding its reach to target Linux and macOS systems alongside Microsoft Windows. New...
HP's latest Threat Insights Report highlights a troubling rise in fake CAPTCHA attacks aimed at deploying the Lumma Stealer remote...
Cybercriminals are taking advantage of vulnerabilities in CheckPoint's antivirus driver to execute malicious campaigns that evade Windows security protocols. A...
In the realm of cyber security, the terms ethical hacking and penetration testing often arise, but what do they truly...
The UK National Cyber Security Centre (NCSC) has established a crucial migration deadline for organizations to adopt post-quantum cryptography (PQC)...
In a significant crackdown on fraud, UK police have arrested 422 individuals, seizing millions in cash and assets as part...
The FishMonger APT group, a notorious Chinese cyber-espionage unit, has been directly tied to I-SOON, a technology contractor under indictment....
The Pennsylvania State Education Association (PSEA) breach has impacted over half a million individuals, highlighting significant data security concerns. More...
UK CNI security leaders demonstrate a strong sense of cyber maturity, revealing a notable contrast with the alarming breach statistics....
Rooted devices pose a significant cybersecurity risk, being 250 times more vulnerable to compromise than standard devices, according to new...
Introduction In the realm of cybersecurity, attackers continually develop methods to circumvent antivirus (AV) protections. One such method involves leveraging...
Europol has raised an alarming concern about a growing 'shadow alliance' between state actors and criminals, leveraging digital and AI...
Gartner predicts that agentic AI will significantly expedite account takeovers, allowing threat actors to hijack accounts more efficiently within two...
Discover how a critical Windows vulnerability known as ZDI-CAN-25373 has been exploited by multiple state-sponsored groups for cyber-espionage since 2017....
A staggering rise in browser phishing attacks has been observed, with 752,000 recorded incidents representing a 140% increase year-over-year (YoY)...
World-renowned physicist Brian Cox will explore the profound implications of quantum computing at Infosecurity Europe 2025. World-renowned physicist, Professor Brian...
The recent warning from CISA highlights a critical vulnerability in Fortinet products that is currently being exploited in ransomware attacks....
In 2025, phishing-as-a-service (PhaaS) attacks surged, with Sneaky 2FA joining the ranks of Tycoon 2FA and EvilProxy as significant threats....
In today’s digital world, where cyber threats are evolving rapidly, the integration of artificial intelligence (AI) into cybersecurity practices offers...
A recent supply chain attack has put the secrets of over 23,000 organizations at risk, exposing them through a compromised...
In 2024, UK social media and email account compromises have surged dramatically, leading to losses nearing £1 million. This alarming...
A newly launched security database seeks to empower non-profits and high-risk individuals in navigating online threats and ensuring their digital...
A bipartisan group of US legislators is calling for transparency in the legal conflict between Apple and the UK government...
Cybersecurity researchers have confirmed a critical link between BlackLock and the infamous Eldorado ransomware group, affirming that BlackLock is essentially...