News
Researchers from Koi Security have detected 18 malicious Chrome and Edge extensions masquerading as benign productivity and ...
Check Point discovered around 500 suspected Scattered Spider phishing domains, suggesting the group is preparing to expand ...
Sonatype’s latest Open Source Malware Index report has identified more than 16,000 malicious open source packages, ...
Shellter is used by professional red teams and pen testers to evade security tools while probing their clients’ attack ...
Identity theft is primarily a data problem, not just a hacking issue, as thieves exploit readily available personal ...
Chinese CCTV provider Hikvision is firmly committed to maintaining its presence in Canada, defying the government’s ban with ...
Trend Micro has observed the Bert ransomware group in operation since April 2025, with confirmed victims in sectors including healthcare, technology and event services ...
Automated reconnaissance coupled with mass exploitation of vulnerabilities have helped ransomware-as-a-service (RaaS) groups to thrive in the past few quarters, ReliaQuest has warned. The threat ...
Zero trust is a concept that has been at the forefront of cybersecurity discourse for almost two decades. First coined by then Forrester analyst John Kindervag in 2009, the principle assumes all users ...
Just one in 10 large enterprises will have a “mature and measurable” zero trust program in place by 2026, and even those that do will increasingly find its controls unable to mitigate the impact of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results