How to Interpret the 2023 MITRE ATT&CK Evaluation Results
Thorough, independent tests are a vital resource for analyzing provider's capabilities to guard against increasingly sophisticated threats to their organization....
Thorough, independent tests are a vital resource for analyzing provider's capabilities to guard against increasingly sophisticated threats to their organization....
Apple has released yet another round of security patches to address three actively exploited zero-day flaws impacting iOS, iPadOS, macOS,...
An active malware campaign targeting Latin America is dispensing a new variant of a banking trojan called BBTok, particularly users...
Atlassian and the Internet Systems Consortium (ISC) have disclosed several security flaws impacting their products that could be exploited to...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infowibu -- codemeter_runtime A heap buffer overflow vulnerability in Wibu CodeMeter Runtime...
Building on our history of cryptographic research Our organisation has a long history of cryptographic research. As the UK national technical authority for...
GitHub has made passkeys generally available across the platform today to secure accounts against phishing and allow passwordless logins for...
Pizza Hut Australia is sending data breach notifications to customers, warning that a cyberattack allowed hackers to access their personal...
A previously unknown threat actor dubbed 'Sandman' targets telecommunication service providers in the Middle East, Western Europe, and South Asia,...
Multiple vulnerabilities were identified in Apple Products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of...
Authorities in the US released a new cybersecurity advisory yesterday updating organizations on the latest tactics, techniques and procedures (TTPs)...
Ransomware attackers are shifting away from “big game” targets and towards easier, less defended organizations, a new report from Trend...
Scams involving human manipulation comprised 75% of all desktop threats in the first half of 2023, according to new data...
The typical business in the US and UK loses over 4% of their online revenue every year due to malicious...
The UK government has announced its decision to establish a data bridge with the US, enabling the free flow of...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infowibu -- codemeter_runtime A heap buffer overflow vulnerability in Wibu CodeMeter Runtime...
Signal has announced that it upgraded its end-to-end communication protocol to use quantum-resistant encryption keys to protect users from future...
The dreaded data breach is an outcome feared by companies of all sizes in today’s threat landscape, largely due to...
A hacker is spreading a fake proof-of-concept (PoC) exploit for a recently fixed WinRAR vulnerability on GitHub, attempting to infect...
The developers of Free Download Manager (FDM) have published a script to check if a Linux device was infected through...
The P2PInfect botnet worm is going through a period of highly elevated activity volumes starting in late August and then...
Today, T-Mobile customers said they could see other peoples' account and billing information after logging into the company's official mobile...
Credit reporting firm TransUnion has denied claims of a security breach after a threat actor known as USDoD leaked data...
Around 10% of British adults have lost money to fraudsters over the past year, amounting to estimated losses of £7.5bn...