Mantis botnet powered the largest HTTPS DDoS attack in June
The largest HTTPS DDoS attack recently mitigated by Cloudflare was launched by the Mantis botnet. In June 2022, DDoS mitigation...
The largest HTTPS DDoS attack recently mitigated by Cloudflare was launched by the Mantis botnet. In June 2022, DDoS mitigation...
Researchers warn of a new vulnerability, dubbed Retbleed, that impacts multiple older AMD and Intel microprocessors. ETH Zurich researchers Johannes Wikner...
Former CIA programmer, Joshua Schulte, was convicted in a US federal court of the 2017 leak of a massive leak...
Microsoft published the exploit code for a vulnerability in macOS that can allow an attacker to escape the sandbox. Microsoft publicly disclosed...
VMware addressed a high-severity privilege escalation flaw, tracked as CVE-2021-22048, in vCenter Server IWA mechanism. VMware addressed a high-severity privilege...
Explore the need for going beyond built-in Microsoft 365 and Google Workspace security based on email threats detected in 2021....
Explore the need for going beyond built-in Microsoft 365 and Google Workspace security based on email threats detected in 2021....
Experts warn that operators behind the Qakbot malware operation are improving their attack chain in an attempt to avoid detection....
IT giant Lenovo released security fixes to address three vulnerabilities that impact the UEFI firmware shipped with over 70 product...
The hugely popular Manga comics platform Mangatoon has fallen victim to a data breach. No fewer than 23 million user...
The Python Package Index (PyPI) says it has begun rolling out a two-factor authentication (2FA) requirement which enforces maintainers of...
A large-scale phishing campaign used adversary-in-the-middle (AiTM) phishing sites to hit more than 10,000 organizations Microsoft observed a large-scale phishing campaign...
Christine Lagarde, the president of the European Central Bank, was the target of a failed hacking attempt. The European Central...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
The protocol for radio-controlled (RC) drones, named ExpressLRS, is affected by vulnerabilities that can allow device takeover. Researchers warn of...
S Innovative students from around the country put their cyber studies to the test in a unique challenge set by...
R National Cyber Security Centre’s CYBERUK 2022 event will take place across two days on 10-11 May UK government’s flagship...
N The NCSC - a part of GCHQ - has today supported President Biden’s call for increased cyber security vigilance...
J The National Cyber Security Centre and the Centre for the Protection of National Infrastructure issue guidance to help UK’s...
D In a speech delivered at the Australian National University, Canberra, Director GCHQ Sir Jeremy Fleming discusses the resolve of...
N Following Russia’s unprovoked, premeditated attack on Ukraine, the National Cyber Security Centre continues to call on organisations in the...
E The NCSC is seeking Expressions of Interest (EOI) from organisations interested in applying to become a Delivery Partner for...
U The UK has today joined international partners to share updated mitigation advice against Russian state-sponsored and criminal cyber threats....
N UK and international allies share details of the top 15 vulnerabilities routinely exploited by malicious actors in 2021 Advisory...