SIM Box Fraud to Drive 700% Surge in Roaming Scams
The volume of global roaming fraud traffic is set to increase by a staggering 700% over the coming five years...
The volume of global roaming fraud traffic is set to increase by a staggering 700% over the coming five years...
Security researchers have shared information on a prolific threat actor who has contributed to multiple ransomware-as-a-service (RaaS) programs over the...
The share of global retailers hit by a serious ransomware breach over the past 12 months fell nearly 10 percentage...
The Singapore-based luxury complex Marina Bay Sands revealed it was hit by a security incident that exposed the personal data...
A “GootBot” implant, a variant of the notorious Gootloader malware, has been discovered by the IBM X-Force team. In an advisory published...
Cybersecurity researchers at SentinelLabs have uncovered a new Python-based infostealer and hack tool named “Predator AI.”The malicious tool is specifically...
A new threat intelligence assessment released by Microsoft’s Threat Analysis Center (MTAC) has warned of potential unprecedented challenges to the...
A proposed update to the EU’s Electronic Identification, Authentication and Trust Services (eIDAS) regulation is facing strong resistance from industry,...
The US government has launched a new campaign designed to encourage critical infrastructure (CNI) stakeholders to enhance cyber-resilience in their organizations.The...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infocontec -- solarview_compact_firmwareAn issue in Contec SolarView Compact v.6.0 and before allows...
SaaS applications make up 70% of total company software usage, and as businesses increase their reliance on SaaS apps, they...
The North Korea-linked nation-state group called BlueNoroff has been attributed to a previously undocumented macOS malware strain dubbed ObjCShellz. Jamf...
A new set of malicious Python packages has slithered their way to the Python Package Index (PyPI) repository with the...
A new variant of the GootLoader malware called GootBot has been found to facilitate lateral movement on compromised systems and...
Multiple ransomware groups have begun to actively exploit recently disclosed flaws in Atlassian Confluence and Apache ActiveMQ. Cybersecurity firm Rapid7...
ChatGPT: Productivity tool, great for writing poems, and… a security risk?! In this article, we show how threat actors can...
Cybersecurity researchers have unmasked a prolific threat actor known as farnetwork, who has been linked to five different ransomware-as-a-service (RaaS)...
Numerous industries—including technology, financial services, energy, healthcare, and government—are rushing to incorporate cloud-based and containerized web applications. The benefits are...
Veeam has released security updates to address four flaws in its ONE IT monitoring and analytics platform, two of which...
The Pakistan-linked threat actor known as SideCopy has been observed leveraging the recent WinRAR security vulnerability in its attacks targeting...
Migrating to post-quantum cryptography In 2020, the NCSC published a white paper on https://www.ncsc.gov.uk/whitepaper/next-steps-preparing-for-post-quantum-cryptography" target="_self">Preparing for Quantum-Safe Cryptography. This paper...
Israeli higher education and tech sectors have been targeted as part of a series of destructive cyber attacks that commenced...
A new dropper-as-a-service (DaaS) cybercrime operation named 'SecuriDropper' has emerged, using a method that bypasses the 'Restricted Settings' feature in Android...
QNAP Systems published security advisories for two critical command injection vulnerabilities that impact multiple versions of the QTS operating system...