Government, diplomatic entities, military organizations, law firms, and financial institutions primarily located in the Middle East have been targeted as part of...
In the business world, mergers and acquisitions are commonplace as businesses combine, acquire, and enter various partnerships. Mergers and Acquisitions (M&A) are...
A corporate cyber-espionage hacker group has resurfaced after a seven-month hiatus with new intrusions targeting four companies this year, including one of...
Today’s businesses run on data. They collect it from customers at every interaction, and they use it to improve efficiency, increase their...
Big data analytics can be directed to several use cases, like marketing, talent management, sales forecasting, or in this case, cybersecurity. Let’s...
Cybersecurity agencies from Australia, the U.K., and the U.S. on Wednesday released a joint advisory warning of active exploitation of Fortinet and...
Lazarus, the North Korea-affiliated state-sponsored group, is attempting to once again target security researchers with backdoors and remote access trojans using a...
At least nine entities across the technology, defense, healthcare, energy, and education industries were compromised by leveraging a recently patched critical vulnerability...
A new spam email campaign has emerged as a conduit for a previously undocumented malware loader that enables the attackers to gain...
Cybersecurity researchers on Tuesday took the wraps off a mass volume email attack staged by a prolific cybercriminal gang affecting a wide...
A threat actor, previously known for striking organizations in the energy and telecommunications sectors across the Middle East as early as April...
As hackers get smarter than ever, cybersecurity becomes a key concern for businesses. Attackers have ways to break into even the most...
Ukrainian law enforcement authorities on Monday disclosed the arrest of a hacker responsible for the creation and management of a “powerful botnet”...
The U.S. government on Wednesday announced the formation of a new Civil Cyber-Fraud Initiative that aims to hold contractors accountable for failing...
A spam campaign delivering spear-phishing emails aimed at South American organizations has retooled its techniques to include a wide range of commodity...
Microsoft on Tuesday addressed a quartet of security flaws as part of its Patch Tuesday updates that could be abused by adversaries...
High-Risk Security Flaws Found and Patched in ZOLL Defibrillator Management Software. The Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA)...
The work-from-anywhere economy has opened up the possibility for your human resources team to source the best talent from anywhere. To scale...
ShinyHunters, a notorious cybercriminal underground group that’s been on a data breach spree since last year, has been observed searching companies’ GitHub...
Pulse Secure has shipped a fix for a critical post-authentication remote code execution (RCE) vulnerability in its Connect Secure virtual private network...
Amazon earlier this April addressed a critical vulnerability in its Kindle e-book reader platform that could have been potentially exploited to take...