Microsoft has announced a new Windows Resiliency Initiative as a way to improve security and reliability, as well as ensure…
Development
Multiple decade-old security vulnerabilities have been disclosed in the needrestart package installed by default in Ubuntu Server (since version 21.04)…
The 2024 ANZ Threat Landscape Report by Cyble reveals an increase in cybersecurity risks faced by organizations across Australia and…
The frequency and sophistication of modern cyberattacks are surging, making it increasingly challenging for organizations to protect sensitive data and…
Threat actors are increasingly banking on a new technique that leverages near-field communication (NFC) to cash out victim’s funds at…
Apple recently rolled out a security update that addresses critical vulnerabilities in multiple Apple devices. Released on November 19, the…
In our latest episode we discuss how a woman hid under the bed after scammers told her she was under…
Credential phishing remains a formidable threat to organizations worldwide, with malicious actors often relying on tricking individuals into voluntarily revealing…
Threat hunters are warning about an updated version of the Python-based NodeStealer that’s now equipped to extract more information from…
Google has revealed that its AI-powered fuzzing tool, OSS-Fuzz, has been used to help identify 26 vulnerabilities in various open-source…
The U.S. law enforcement has unsealed criminal charges against five individuals involved in a large-scale phishing scheme targeting employees at…
Five alleged members of the infamous Scattered Spider cybercrime crew have been indicted in the U.S. for targeting employees of…
New research has uncovered more than 145,000 internet-exposed Industrial Control Systems (ICS) across 175 countries, with the U.S. alone accounting…
As a relatively new security category, many security operators and executives I’ve met have asked us “What are these Automated…
Threat actors with ties to the Democratic People’s Republic of Korea (DPRK) are impersonating U.S.-based software and technology consulting businesses…
The Annual Cyber Threat Report 2023-2024 has shared crucial insights into the current state of cybersecurity in Australia, detailing the…
Privileged access management (PAM) plays a pivotal role in building a strong security strategy. PAM empowers you to significantly reduce…
The China-aligned advanced persistent threat (APT) actor known as Gelsemium has been observed using a new Linux backdoor dubbed WolfsBane…
A hacker calling themselves “nears” claims to have compromised the systems of multiple healthcare facilities across France, claiming to have…
As many as 2,000 Palo Alto Networks devices are estimated to have been compromised as part of a campaign abusing…