Boosting Your Cyber Defenses with Security Awareness Training
In today's digital landscape, security awareness training is more crucial than ever. With cyber threats evolving daily, it’s the key...
In today's digital landscape, security awareness training is more crucial than ever. With cyber threats evolving daily, it’s the key...
The Albabat ransomware has undergone significant evolution, expanding its reach to target Linux and macOS systems alongside Microsoft Windows. New...
HP's latest Threat Insights Report highlights a troubling rise in fake CAPTCHA attacks aimed at deploying the Lumma Stealer remote...
Cybercriminals are taking advantage of vulnerabilities in CheckPoint's antivirus driver to execute malicious campaigns that evade Windows security protocols. A...
The UK National Cyber Security Centre (NCSC) has established a crucial migration deadline for organizations to adopt post-quantum cryptography (PQC)...
UK CNI security leaders demonstrate a strong sense of cyber maturity, revealing a notable contrast with the alarming breach statistics....
A staggering rise in browser phishing attacks has been observed, with 752,000 recorded incidents representing a 140% increase year-over-year (YoY)...
World-renowned physicist Brian Cox will explore the profound implications of quantum computing at Infosecurity Europe 2025. World-renowned physicist, Professor Brian...
In 2025, phishing-as-a-service (PhaaS) attacks surged, with Sneaky 2FA joining the ranks of Tycoon 2FA and EvilProxy as significant threats....
Discover how a critical Windows vulnerability known as ZDI-CAN-25373 has been exploited by multiple state-sponsored groups for cyber-espionage since 2017....
In today’s digital world, where cyber threats are evolving rapidly, the integration of artificial intelligence (AI) into cybersecurity practices offers...
A newly launched security database seeks to empower non-profits and high-risk individuals in navigating online threats and ensuring their digital...
The digital supply chains of UK companies are notably larger and more complex compared to their global counterparts, posing significant...
A recent study by Specops uncovers prevalent passwords used in attacks on Remote Desktop Protocol (RDP), emphasizing the security risks...
A recent study reveals how GenAI tools can create information-stealing malware. This research, led by Vitaly Simonovich at Cato Networks,...
In today's increasingly protectionist global landscape, cybersecurity organizations need to enhance collaboration to combat escalating threats, as emphasized by Sir...
In the ever-evolving landscape of cybersecurity, threat hunting has emerged as a pivotal practice for organizations aiming to protect their...
In Q4 2024, cybersecurity startups experienced a substantial influx of venture capital investment, marking a remarkable 35% year-on-year growth. Venture...
The Volt Typhoon cyber intrusion highlights critical vulnerabilities within the US electric grid, raising urgent cybersecurity concerns. A prolonged cyber...
The UK cybersecurity sector has recently shown remarkable growth, with revenue increasing by 12% to surpass £13 billion, according to...
The Trump administration is implementing drastic changes at the Cybersecurity and Infrastructure Agency (CISA), affecting staff and funding for vital...
In 2024, a staggering 95% of data breaches were linked to human error, highlighting critical vulnerabilities within organizations. According to...
In a significant move, New York Attorney General Letitia James has initiated a lawsuit against Allstate's National General unit, claiming...
The number of unauthorized Cobalt Strike copies has seen an impressive 80% drop thanks to intensified security efforts. Efforts to...