HTTP Clients Surge in Account Takeover Attacks on Microsoft 365
Cybercriminals are increasingly using HTTP client tools for account takeover (ATO) attacks, significantly targeting Microsoft 365 environments. In a concerning...
Cybercriminals are increasingly using HTTP client tools for account takeover (ATO) attacks, significantly targeting Microsoft 365 environments. In a concerning...
Tata Technologies, a subsidiary of Tata Group, has recently experienced a significant ransomware attack that impacted its IT assets. Tata...
The UK government's IT systems are facing serious security vulnerabilities, prompting calls for improved cyber resilience across departments. The National...
Nation-state hackers are increasingly exploiting Google's Gemini AI tool for their cyber operations. This article explores how various countries are...
The rise of AI has led to a staggering 1205% increase in API vulnerabilities, highlighting a crucial security concern for...
Blockchain technology has rapidly evolved from a buzzword to a foundational element of our digital landscape. While its promise of...
In 2024, an unprecedented surge in data breaches led to over 1.7 billion victims in the US, highlighting critical cybersecurity...
Tycoon 2FA has recently been upgraded to effectively bypass multi-factor authentication, posing significant security risks. A new and improved version...
The UK education sector faces alarming cybersecurity threats, with 73% of institutions reporting cyber-attacks in the last five years. The...
In December 2024, ransomware attacks skyrocketed to an all-time high, revealing troubling trends in global cybersecurity threats. The latest Threat...
CISOs are increasingly gaining influence in the boardroom, but there's a pressing need for them to enhance their soft skills,...
Threat actors are actively exploiting chained vulnerabilities in Ivanti Cloud Service Appliances (CSA), intensifying the risk of cyber-attacks on organizations....
AWS is providing a significant £5m grant aimed at fortifying cybersecurity in UK educational institutions, addressing pressing security challenges. Amazon...
Two ransomware gangs, HellCat and Morpheus, reveal alarming trends in the ransomware ecosystem, showcasing shared code in their operations. Recent...
SaaS breaches have seen a staggering rise of 300%, highlighting the inadequacy of traditional cybersecurity measures. This alarming trend underscores...
Forensic analysis plays a critical role in modern cybersecurity, bridging the gap between technology and law enforcement. As cyber threats...
Email bombing and Teams vishing are tactics employed by Russian ransomware groups to gain unauthorized access to corporate systems. Security...
In response to significant cyber intrusions, the US has imposed sanctions on Chinese state cyber actors involved in breaches of...
The DONOT APT group from India is exploiting a malicious Android application disguised as a chat platform for intelligence gathering....
The EU is taking significant steps to improve healthcare cybersecurity with the launch of a new Cybersecurity Support Centre by...
In a proactive move, President Joe Biden has strengthened the software supply chain security requirements just before the transition of...
A new hacking group has exposed the configuration files of 15,000 Fortinet firewalls, raising serious security concerns. A new threat...
The Digital Operational Resilience Act (DORA) brings significant compliance challenges for financial firms navigating new regulations in the EU. The...
In the ever-evolving world of cybersecurity, the Lazarus Group has emerged as a significant threat, specifically targeting developers to gain...