As technology has become fundamental for businesses across almost all sectors and industries to continue to operate the recruitment and…
Browsing: Malware and Vulnerabilities
As cloud adoption and digital transformation increases, more sensitive data from applications is being stored in data containers. This is…
Researchers have uncovered a new campaign targeting U.S., Canadian and Japanese energy providers to the North Korean Lazarus APT hacking…
According to Metro, One of the first images taken by Nasa’s James Webb Telescope is being used by hackers in…
The U.S NSA and CISA have shared tips to secure the software supply chain. But is this actually a step…
As reported by Bloomberg, on Monday, several cybersecurity analysts tweeted about the discovery of what was purportedly a breach of…
Digitalisation and the immense surge of eCommerce is fostering a dramatic increase in online fraud, particularly authorised push payment fraud…
Microsoft-owned LinkedIn is being used by hackers to spread data stealing malware via sending connection requests in disguise of people…
It has been reported that cyber-criminals are increasingly hijacking home IP addresses to hide credential stuffing activity and increase their…
Security researchers at CYFIRMA have discovered over 80,000 Hikvision cameras vulnerable to a critical command injection flaw that’s easily exploitable…