NCSC Calls on UK Firms to Join Mass Cyber-Deception Initiative
The UK’s leading cybersecurity agency has called on the country’s organizations to deploy cyber-deception technologies at scale, in a bid...
The UK’s leading cybersecurity agency has called on the country’s organizations to deploy cyber-deception technologies at scale, in a bid...
An Iranian state-backed threat actor is targeting individuals associated with the Harris and Trump Presidential campaigns, according to Google’s Threat...
Chemical manufacturing company Orion has revealed it has lost $60m in a business email compromise (BEC) scam.In a filing to the...
IT management software provider SolarWinds has urged customers to immediately patch a critical vulnerability in its Web Help Desk platform.CVE-2024-28986...
A new sophisticated phishing attack featuring a stealthy infostealer malware that exfiltrates a wide range of sensitive data has been uncovered...
A new sophisticated ValleyRAT campaign has been targeting Chinese systems. Uncovered by FortiGuard Labs, the campaign affects Windows users, allowing...
Ransomware actors are set for their highest-grossing year on record in 2024 after crypto inflows in the first half of...
Two Russian-aligned cyber espionage squads have been conducting a sophisticated spear phishing campaign against Western and Russian civil society entities...
Read more about cybersecurity at the Paris Olympics: Paris 2024 Olympics Face Escalating Cyber-Threats Paris 2024 CISO Reveals Cybersecurity Plans...
SolarWinds has released patches to address a critical security vulnerability in its Web Help Desk software that could be exploited...
Russian and Belarusian non-profit organizations, Russian independent media, and international non-governmental organizations active in Eastern Europe have become the target...
A cybercrime group with links to the RansomHub ransomware has been observed using a new tool designed to terminate endpoint...
A previously unknown threat actor has been attributed to a spate of attacks targeting Azerbaijan and Israel with an aim...
The Emergence of Identity Threat Detection and Response Identity Threat Detection and Response (ITDR) has emerged as a critical component...
A newly discovered attack vector in GitHub Actions artifacts dubbed ArtiPACKED could be exploited to take over repositories and gain...
Cybersecurity researchers have discovered a new variant of the Gafgyt botnet that's targeting machines with weak SSH passwords to ultimately...
Post-quantum cryptography: what comes next? This month, a major milestone in post-quantum cryptography (PQC) has been reached: 3 algorithm standards...
An ongoing social engineering campaign with alleged links to the Black Basta ransomware group has been linked to "multiple intrusion...
A coalition of law enforcement agencies coordinated by the U.K. National Crime Agency (NCA) has led to the arrest and...
Simply relying on traditional password security measures is no longer sufficient. When it comes to protecting your organization from credential-based...
Microsoft on Tuesday shipped fixes to address a total of 90 security flaws, including 10 zero-days, of which six have...
Ivanti has rolled out security updates for a critical flaw in Virtual Traffic Manager (vTM) that could be exploited to...
The China-backed threat actor known as Earth Baku has diversified its targeting footprint beyond the Indo-Pacific region to include Europe,...
Monitoring evolving DDoS trends is essential for anticipating threats and adapting defensive strategies. The comprehensive Gcore Radar Report for the...