How To Get the Most From Your Security Team’s Email Alert Budget
We'll TL;DR the FUDdy introduction: we all know that phishing attacks are on the rise in scale and complexity, that...
We'll TL;DR the FUDdy introduction: we all know that phishing attacks are on the rise in scale and complexity, that...
Microsoft researchers have uncovered a vulnerability in ESXi hypervisors being exploited by several ransomware operators to obtain full administrative permissions...
Meta, the parent company of Facebook, Instagram, and WhatsApp, agreed to a record $1.4 billion settlement with the U.S. state...
US firm HealthEquity has revealed that a data breach earlier this year led to the compromise of personal and financial...
Cybercriminals have been observed capitalizing on the growing use of Generative AI (GenAI) platforms by selling stolen account credentials on...
Millions of perfectly spoofed emails have been sent daily as hackers took advantage of a flaw in Proofpoint’s email protection...
Security researchers have uncovered a sophisticated phishing campaign targeting Microsoft OneDrive users. The campaign employs advanced social engineering tactics to...
Basic security failings allowed hackers to access the personal details of 40 million British voters held by the UK’s Electoral...
As more people work remotely, IT departments must manage devices distributed over different cities and countries relying on VPNs and...
Cybersecurity researchers have detailed widespread phishing campaigns targeting small and medium-sized businesses (SMBs) in Poland during May 2024 that led...
A new iteration of a sophisticated Android spyware called Mandrake has been discovered in five applications that were available for...
The nation-state threat actor known as SideWinder has been attributed to a new cyber espionage campaign targeting ports and maritime...
Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill's threat experts. Each...
Cybersecurity researchers are warning about a new phishing campaign that targets Microsoft OneDrive users with the aim of executing a...
A recently patched security flaw impacting VMware ESXi hypervisors has been actively exploited by "several" ransomware groups to gain elevated...
A US-headquartered cryptocurrency exchange has revealed a supply chain breach which led to the compromise of personal and banking information...
Security researchers have unveiled critical vulnerabilities within web analytics provider Hotjar and global news outlet Business Insider. The findings, from Salt...
Security researchers have shed light on a new iteration of Mandrake, a sophisticated Android cyber-espionage malware tool. Initially analyzed by...
An unknown PowerShell backdoor has been discovered alongside a new variant of the Zloader/SilentNight malware, Walmart’s Cyber Intelligence Team has...
European businesses have been urged to carefully assess what privacy, security and acceptable usage controls they need to place on...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Cybersecurity company Acronis is warning that a now-patched critical security flaw impacting its Cyber Infrastructure (ACI) product has been exploited...
An unknown threat actor has been linked to a massive scam campaign that exploited an email routing misconfiguration in email...
A threat actor known as Stargazer Goblin has set up a network of inauthentic GitHub accounts to fuel a Distribution-as-a-Service...