PlushDaemon APT Targets South Korean VPN Software in Cyber Espionage Operation
In 2023, a concerning cyber espionage operation was executed by the newly identified advanced persistent threat (APT) group, PlushDaemon, targeting...
In 2023, a concerning cyber espionage operation was executed by the newly identified advanced persistent threat (APT) group, PlushDaemon, targeting...
Cisco has identified a serious privilege escalation vulnerability in its Meeting Management tool, known as CVE-2025-20156, that poses a risk...
Bookmakers are ramping up efforts to combat arbitrage betting fraud, which poses significant challenges due to automation and sophisticated money...
GhostGPT, a new generative AI chatbot, is emerging as a significant aid in malware creation and phishing attempts, raising concerns...
CISOs are increasingly gaining influence in the boardroom, but there's a pressing need for them to enhance their soft skills,...
Threat actors are actively exploiting chained vulnerabilities in Ivanti Cloud Service Appliances (CSA), intensifying the risk of cyber-attacks on organizations....
Two ransomware gangs, HellCat and Morpheus, reveal alarming trends in the ransomware ecosystem, showcasing shared code in their operations. Recent...
The FBI has raised concerns about North Korean IT workers who are engaging in data extortion schemes to generate revenue...
AWS is providing a significant £5m grant aimed at fortifying cybersecurity in UK educational institutions, addressing pressing security challenges. Amazon...
Russian scammers are increasingly targeting crypto influencers as a new report unveils intricate tactics by the notorious Crazy Evil group....
The Change Healthcare breach, now affecting 190 million individuals, has become the largest healthcare data breach to date, confirmed by...
In 2024, hidden text salting has emerged as a significant tactic used by cybercriminals to bypass email security measures and...
SaaS breaches have seen a staggering rise of 300%, highlighting the inadequacy of traditional cybersecurity measures. This alarming trend underscores...
As high-profile cyber-attacks continue to threaten organizations, CISOs are set to boost crisis simulation budgets significantly in 2025. According to...
A recently discovered Subaru bug has revealed vulnerabilities in vehicle infotainment systems that could allow for remote tracking and hijacking...
A new phishing campaign is endangering mobile users by leveraging advanced social engineering tactics and malicious PDFs aimed at stealing...
Insider threats represent a unique challenge in cyber security, often evolving from trusted employees or contractors. These threats can stem...
Forensic analysis plays a critical role in modern cybersecurity, bridging the gap between technology and law enforcement. As cyber threats...
Email bombing and Teams vishing are tactics employed by Russian ransomware groups to gain unauthorized access to corporate systems. Security...
In the ever-evolving landscape of data protection, many European privacy teams are facing significant challenges. A recent report highlights understaffing...
The new Mirai malware variant, known as Murdoc_Botnet, is specifically targeting AVTECH cameras and Huawei routers, taking advantage of known...
Phishing risks are escalating as security researchers reveal how Zendesk subdomains can be exploited for malicious attacks. A recent analysis...
In 2024, GDPR fines reached €1.2bn ($1.26bn), marking a notable 33% decrease from the previous year as reported by DLA...
Oracle will address 320 security vulnerabilities in its January Patch Update, affecting a wide range of products and services. Software...