North Korean Hackers Exploit GitHub for Fake IT Worker Profiles
North Korean hackers are using GitHub strategically to create fake IT worker personas aimed at securing remote job opportunities in...
North Korean hackers are using GitHub strategically to create fake IT worker personas aimed at securing remote job opportunities in...
CISO personal liability risks are prompting organizations to rethink their policies, with 93% implementing changes over the last year. According...
Discover the latest cyber-espionage campaign targeting UAE's aviation and transport, involving sophisticated malware and advanced techniques. A new cyber-espionage campaign...
Private 5G networks are increasingly being adopted across various sectors, but security risks arise from insufficient communications technology expertise, especially...
A serious BYOVD attack has been identified, exploiting a zero-day vulnerability in Paragon Partition Manager, posing significant risks to users....
The ICO has initiated an investigation into TikTok along with Reddit and Imgur, focusing on the protection of children's personal...
A new phishing campaign is leveraging the open-source Havoc framework to stealthily control infected systems, heightening concerns about cyber threats....
Discover how attackers are leveraging Microsoft Teams and Quick Assist to gain unauthorized access through advanced social engineering tactics. A...
The US Cybersecurity and Infrastructure Security Agency (CISA) has reaffirmed its commitment to safeguard critical infrastructure from all cyber threats,...
Vodafone is leading the way in ensuring smartphone security against future quantum threats with its trial of innovative quantum-safe technology....
In today's digital landscape, phishing attacks have emerged as one of the most prevalent and damaging threats to individuals and...
In a significant development in cybersecurity, a notorious data extortion criminal has been arrested in Thailand, highlighting the ongoing battle...
In February 2025, the cybersecurity mergers and acquisitions (M&A) scene remained vibrant, highlighted by the significant acquisition of SolarWinds for...
Old vulnerabilities continue to present significant risks in cybersecurity, as cyber threat actors exploit both new and long-standing weaknesses to...
In 2024, third-party attacks have emerged as a key factor in driving substantial financial losses due to cyber incidents, as...
In an era where businesses are increasingly reliant on web applications, ensuring their security has become paramount. Web application security...
The FBI has confirmed that the notorious Lazarus Group from North Korea was responsible for the recent massive cryptocurrency heist...
The OpenSSF has reached a remarkable milestone with the launch of its new security framework aimed at enhancing the security...
The Winos 4.0 malware campaign is a significant threat to Taiwan, leveraging email impersonation tactics to target organizations effectively. A...
In an alarming trend, the average time to fix software vulnerabilities has now reached nearly nine months, according to Veracode’s...
In 2024, Chinese cyber espionage operations have risen dramatically, with a reported 150% increase according to CrowdStrike's latest findings. Recent...
A significant ransomware incident was reported as DragonForce launched an attack on a prominent Saudi firm, leading to the theft...
Geopolitical tensions have significantly increased advanced persistent threat (APT) incidents and hacktivism in 2024, according to recent findings by Group-IB....
A recent ransomware attack has resulted in the publication of sensitive patient data from Genea, an IVF clinic, by the...