Two-Thirds of UK Sites Vulnerable to Bad Bots
The majority (66%) of UK websites are unable to block simple bot attacks, exposing their businesses to fraud, account compromise...
The majority (66%) of UK websites are unable to block simple bot attacks, exposing their businesses to fraud, account compromise...
UK organizations lost billions in data breaches between 2019 and 2022, with hundreds of millions of their customers suffering compromise...
Identity theft has established itself as the main initial access method for threat actors, according to CrowdStrike.In its 2023 Threat...
Security researchers have discovered a likely North Korean cyber-espionage campaign targeting the IT network of a Russian manufacturer of intercontinental...
Law firm Morgan & Morgan has lodged a class-action lawsuit against Tampa General Hospital on behalf of three victims affected...
The UK’s Electoral Commission has revealed it has been the victim of a “complex cyber-attack,” exposing the personal details of...
Sophos X-Ops has exposed a new connection between seemingly unrelated ransomware attacks. The findings, based on several ransomware attacks in the...
An unidentified threat actor, reportedly originating from Vietnam, has been observed engaging in a ransomware campaign that commenced no later...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoyunyecms -- yunyecmsSQL injection vulnerability in yunyecms 2.0.2 allows remote attackers to...
Description of Problem An issue has been discovered in Citrix Hypervisor 8.2 CU1 LTSR that may allow malicious, privileged code...
The operators associated with the QakBot (aka QBot) malware have set up 15 new command-and-control (C2) servers as of late...
New research has revealed that threat actors are abusing Cloudflare Tunnels to establish covert communication channels from compromised hosts and...
Cybersecurity researchers have discovered a set of 11 living-off-the-land binaries-and-scripts (LOLBAS) that could be maliciously abused by threat actors to...
Introduced in 1999, Microsoft Active Directory is the default identity and access management service in Windows networks, responsible for assigning...
An unknown threat actor is using a variant of the Yashma ransomware to target various entities in English-speaking countries, Bulgaria,...
Microsoft on Friday disclosed that it has addressed a critical security flaw impacting Power Platform, but not before it came...
The U.S. Federal Bureau of Investigation (FBI) is warning about cyber crooks masquerading as legitimate non-fungible token (NFT) developers to...
Threat actors are using an open-source rootkit called Reptile to target Linux systems in South Korea. "Unlike other rootkit malware...
Managed Detection and Response (MDR) has emerged as a crucial solution for organizations looking to bolster their security measures. MDR...
Vulnerable Redis services have been targeted by a "new, improved, dangerous" variant of a malware called SkidMap that's engineered to...
A new malware campaign has been observed making use of malicious OpenBullet configuration files to target inexperienced cyber criminals with...
In today's interconnected world, evolving security solutions to meet growing demand is more critical than ever. Collaboration across multiple solutions...
A group of academics has devised a "deep learning-based acoustic side-channel attack" that can be used to classify laptop keystrokes...
Two different North Korean nation-state actors have been linked to a cyber intrusion against NPO Mashinostroyeniya, a major Russian missile...