Over Half of UK Firms Concerned About Insider Threats
A majority (54%) of UK business decision makers are concerned about the likelihood of their employees being approached by cybercriminals,...
A majority (54%) of UK business decision makers are concerned about the likelihood of their employees being approached by cybercriminals,...
Security researchers have warned that threat actors are increasingly turning to zero-day exploits to increase the success rate of advanced...
A joint Cybersecurity Advisory (CSA) issued by the Federal Bureau of Investigation (FBI), National Security Agency (NSA), US Cyber Command...
The UK Department for Science, Innovation and Technology (DSIT) has revealed what its future Cybersecurity Governance Code of Practice will...
This is part one of a two-part series on advancing digital trust in a security context.The term “digital trust” has...
Between 2021 and 2023, 34 million credentials from the Roblox gaming platform have been exposed on the dark web, marking...
Nitrogen is the name given to a campaign and associated malware that have been distributed via malicious search ads. Its...
An ongoing campaign of malicious ads has been targeting Chinese-speaking users with lures for popular messaging applications such as Telegram...
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on...
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on...
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on...
It was just a little over a year ago that the Rhadamanthys stealer was first publicly seen distributed via malicious...
Remote Monitoring & Management (RMM) software, including popular tools like AnyDesk, Atera, and Splashtop, are invaluable for IT administrators today,...
For many households, energy costs represent a significant part of their overall budget. And when customers want to discuss their...
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on...
Image: Midjourney Russian military hackers are using compromised Ubiquiti EdgeRouters to evade detection, the FBI says in a joint advisory...
The story incorrectly stated that the Hessen state in Germany was attacked. The story has been updated to clarify that...
Malicious JavaScript code hidden in a Tornado Cash governance proposal has been leaking deposit notes and data to a private...
Today, the FBI, CISA, and the Department of Health and Human Services (HHS) warned U.S. healthcare organizations of targeted ALPHV/Blackcat...
Image: Cencora (Previously known as AmerisourceBergen)Pharmaceutical giant Cencora says they suffered a cyberattack where threat actors stole data from corporate IT...
The Phishing as a Service (PhaaS) platform 'LabHost' has been helping cybercriminals target North American banks, particularly financial institutes in...
Image: Midjourney Microsoft says the February 2024 updates fail to install on Windows 11 22H2 and 23H2 systems, with 0x800F0922...
Image: Midjourney The Black Basta and Bl00dy ransomware gangs have joined widespread attacks targeting ScreenConnect servers unpatched against a maximum...
Three-quarters (74%) of commercial codebases contain open source components featuring “high-risk” vulnerabilities, according to a new study from Synopsys.The chip...