How To Get the Most From Your Security Team’s Email Alert Budget
We’ll TL;DR the FUDdy introduction: we all know that phishing at…
We’ll TL;DR the FUDdy introduction: we all know that phishing at…
A new malicious campaign has been observed making use of malicio…
Companies in Russia and Moldova have been the target of a phishi…
Meta, the parent company of Facebook, Instagram, and WhatsApp, a…
Learn about critical threats that can impact your organization a…
The nation-state threat actor known as SideWinder has been attri…
Cybersecurity researchers are warning about a new phishing campa…
A recently patched security flaw impacting VMware ESXi hyperviso…
An unknown threat actor has been linked to a massive scam campai…
Searchable Encryption has long been a mystery. An oxymoron. An u…
A threat actor known as Stargazer Goblin has set up a network of…
The remote access trojan known as Gh0st RAT has been observed be…
French judicial authorities, in collaboration with Europol, have…
Cybersecurity researchers have discovered a malicious package on…
The U.S. Department of Justice (DoJ) on Thursday unsealed an ind…
Cybersecurity researchers are sounding the alarm over an ongoing…
CrowdStrike is alerting about an unfamiliar threat actor attempt…
Progress Software is urging users to update their Telerik Report…
Cybersecurity researchers have disclosed a privilege escalation …
The Internet Systems Consortium (ISC) has released patches to ad…
Google said it's adding new security warnings when downloadi…
The threat actor known as Patchwork has been linked to a cyber a…
Cybersecurity firm CrowdStrike on Wednesday blamed an issue in i…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…
The Computer Emergency Response Team of Ukraine (CERT-UA) has al…
Google on Monday abandoned plans to phase out third-party tracki…
As a vCISO, you are responsible for your client's cybersecur…
The JavaScript downloader malware known as SocGholish (aka FakeU…
Cybersecurity researchers have discovered a new Linux variant of…
Cybersecurity firm CrowdStrike, which is facing the heat for cau…
Law enforcement officials in the U.K. have arrested a 17-year-ol…
Event Overview The "AI Leaders Spill Their Secrets" we…
SolarWinds has addressed a set of critical security flaws impact…
Indian cryptocurrency exchange WazirX has confirmed that it was …
Unknown threat actors have been observed leveraging open-source …
Meta has suspended the use of generative artificial intelligence…
Cisco has released patches to address a maximum-severity securit…
The financially motivated threat actor known as FIN7 has been ob…
A China-linked threat actor called APT17 has been observed targe…
The infamous cybercrime group known as Scattered Spider has inco…
Threat actors are actively exploiting a recently disclosed criti…
The Iranian nation-state actor known as MuddyWater has been obse…
An advanced persistent threat (APT) group called Void Banshee ha…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…
Imagine you could gain access to any Fortune 100 company for $10…
A threat actor that was previously observed using an open-source…
Retail banking institutions in Singapore have three months to ph…
Cybersecurity researchers have shed light on a new version of a …
American telecom service provider AT&T has confirmed that th…
Two Russian-born Australian citizens have been arrested and char…
A critical security issue has been disclosed in the Exim mail tr…
In today's digital age, passwords serve as the keys to our m…
The U.S. Department of Justice (DoJ) said it seized two internet…
Today, all organizations are exposed to the threat of cyber brea…
Spanish language victims are the target of an email phishing cam…
Multiple threat actors have been observed exploiting a recently …
GitLab has shipped another round of updates to close out securit…
Google on Wednesday announced that it's making available pas…
Cryptocurrency analysts have shed light on an online marketplace…
The sophisticated malware known as ViperSoftX has been observed …
Select versions of the OpenSSH secure networking suite are susce…
Clear Web vs. Deep Web vs. Dark Web Threat intelligence professi…
Military personnel from Middle East countries are the target of …
Cybersecurity agencies from Australia, Canada, Germany, Japan, N…
Unknown threat actors have been found propagating trojanized ver…
Events like the recent massive CDK ransomware attack – which shu…
Financial institutions in Latin America are being threatened by …
Four unpatched security flaws, including three critical ones, ha…
Apple removed a number of virtual private network (VPN) apps in …
The attack surface isn’t what it once was and it’s becoming a ni…
The malware known as GootLoader continues to be in active use by…
The supply chain attack targeting widely-used Polyfill[.]io Java…
Cybersecurity researchers have uncovered a new botnet called Zer…
Microsoft has revealed two security flaws in Rockwell Automation…
Brazil's data protection authority, Autoridade Nacional de P…
Cloud communications provider Twilio has revealed that unidentif…
Unknown threat actors have been observed exploiting a now-patche…
The loader-as-a-service (LaaS) known as FakeBat has become one o…
An unnamed South Korean enterprise resource planning (ERP) vendo…
Modern CPUs from Intel, including Raptor Lake and Alder Lake, ha…
A China-nexus cyber espionage group named Velvet Ant has been ob…
An Australian man has been charged with running a fake Wi-Fi acc…
Installers for three different software products developed by an…
OpenSSH maintainers have released security updates to contain a …
Juniper Networks has released out-of-band security updates to ad…