US DoD Implements Stricter Cybersecurity Standards for Defense Contractors
The US Department of Defense (DoD) is enhancing its cybersecurity standards for defense contractors, requiring compliance through the Cybersecurity Maturity...
The US Department of Defense (DoD) is enhancing its cybersecurity standards for defense contractors, requiring compliance through the Cybersecurity Maturity...
Casio has confirmed a significant ransomware attack that has compromised its corporate systems and customer data, raising security concerns. Casio...
The recent data breach affecting Game Freak, the renowned developer behind the Pokémon franchise, reveals sensitive information of over 2,600...
Microsoft's Digital Defense Report 2024 reveals that nation-state threat actors are increasingly collaborating with cybercriminals to achieve their political and...
The Cerberus Android Banking Trojan has recently resurfaced, being deployed in a sophisticated new multi-stage malicious campaign targeting mobile users....
Organizations are lagging in their preparedness for the post-quantum threat, highlighted by a recent report from the Entrust Cybersecurity Institute....
A new clawback service by a leading insurer aims to tackle business email compromise (BEC) scams that have led to...
In a shocking revelation, security researchers have found that over eight million users may have unknowingly installed over 200 malicious...
Educational organizations across the UK can now access invaluable free cybersecurity services offered by the National Cyber Security Centre (NCSC)....
As the 2024 US Presidential election approaches, a rise in darknet activity poses significant cybersecurity threats, including phishing and ransomware....
In recent days, alarming reports suggested that Chinese researchers have cracked military-grade encryption using quantum computing, but security experts urge...
The UK government has introduced an innovative AI safety research program aimed at enhancing resilience against deepfakes and other AI-driven...
The ConfusedPilot attack method poses a significant threat to AI systems like Microsoft 365 Copilot by utilizing data poisoning techniques....
Attention, coffee lovers! A new phishing scam is on the rise, disguising itself as enticing Starbucks offers to deceive unsuspecting...
CISA's latest publication emphasizes the need for enhanced software supply chain transparency, focusing on the crucial role of Software Bill...
A recent report reveals a notable shift among ethical hackers towards embracing AI tools as cyber threats rise significantly. A...
FIDO Alliance is advancing online security with a new passkey exchange standard that promises to revolutionize how credentials are managed...
As cyber threats escalate, Dr. Richard Horne, the new head of the UK's National Cyber Security Centre, emphasizes the urgent...
Threat actors are attempting to abuse the open-source EDRSilencer tool as part of efforts to tamper endpoint detection and response...
The FIDO Alliance said it's working to make passkeys and other credentials more easier to export across different providers and...
AI from the attacker's perspective: See how cybercriminals are leveraging AI and exploiting its vulnerabilities to compromise systems, users, and...
The North Korean threat actor known as ScarCruft has been linked to the zero-day exploitation of a now-patched security flaw...
A new spear-phishing campaign targeting Brazil has been found delivering a banking malware called Astaroth (aka Guildma) by making use...
To defend your organization against cyber threats, you need a clear picture of the current threat landscape. This means constantly...