Cybercriminals are increasingly leveraging malicious LNK files as an initial access method to download and execute payloads such as Bumblebee, IcedID, and...
Signal, a cross-platform centralized encrypted instant messaging service declares that a data breach at Cloud Communication Company Twilio exposed almost 1,900 Signal...
The Cisco Nexus Dashboard data center management solution was found to have severe vulnerabilities that Cisco has addressed recently. The total number...
In order to conceal malicious processes, a new Linux rootkit malware dubbed, ‘Syslogk’ has been hacking computers by using specially crafted “magic...
Ransomware is on the rise. In fact, it is estimated that a new attack will occur every 11 seconds. By the time...
The CSA and FBI have collaboratively conducted various types of analysis over hacking activity. There have been speculations on Russian State-Sponsored threat...
The Tech giant reported that their systems were compromised by the hacker group LAPSUS$ who were also responsible for the Nvidia data...
Cybercriminals leverage multiple methods to bring financial gain. Most of the ways are based on infiltrating an organization’s network and gaining unauthenticated...
Several spyware campaigns have been discovered recently by the security researchers at Kaspersky Labs in which the industrial enterprises were targeted by...
MSPs refer to managed service providers, who offer a wide range of services to their clients. MSSPs, on the other hand, are...
A critical SSRF vulnerability has been detected recently in the VMware Workspace ONE UEM console, that could be exploited by the threat...
Artificial intelligence (AI) continues to change nearly every facet of online and offline life, from how we interact with friends and family...
Kali Linux 2021.4 comes with several improved features, including Samba compatibility, better Apple M1 support, switching package manager mirrors – Download Kali...
Although there are countless ways to combat cyberattacks, in this article we are addressing 3 simple yet significant points that users can...
Officials of Panasonic have recently asserted that their servers were accessed illegally earlier this month by hackers. Here’s what the official press...
Curious about Ring Security’s newest innovation in home security? Here is the rundown on Ring’s new Virtual Security Guard, a home security...
OSINT or Open source intelligence refers to information about businesses or people that can be collected from online sources. However, it requires...
The latest cloud security breaches show that we have miles to go as we keep fighting to keep our sensitive data safe. ...
Tianfu Cup is the Chinese version of the Pwn2own in which hackers from Kunlun Lab managed to secure first place by hacking...
Cybersecurity companies are the backbone to fight cybercrime – Let’s dig deeper into which cybersecurity company is doing what and how. Cybersecurity...
When it comes to preventing financial crime such as anti-money laundering, organizations need to make use of a customer screening process that...