Security researchers have identified Mirax, a sophisticated Remote Access Trojan (RAT) that is redefining mobile malware by transforming infected smartphones into residential proxy nodes, enabling...
Cisco has issued a critical security advisory warning of an authentication bypass vulnerability in Cisco Catalyst SD-WAN Controller and Cisco Catalyst SD-WAN Manager that...
A new wave of highly targeted cyberattacks is putting hospitals, local governments, and even defense-linked operators at risk leveraging deception, advanced malware,...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
A global criminal phishing network that victimized over 480,000 individuals has been dismantled following an international operation spanning Spain and several Latin American countries....
In the ever-evolving world of cybersecurity, new tools and techniques are continually emerging-some designed to fortify defenses, while others are created to exploit vulnerabilities....
In the ever-evolving world of cyber threats, ransomware groups are constantly refining their tactics to achieve their malicious goals. One recent tactic gaining traction...
In a significant win against global cybercrime, the U.S. Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI) announced the disruption of...
On September 19, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) issued six new Industrial Control Systems (ICS) advisories. These advisories focus on vulnerabilities...
The Office of the Australian Information Commissioner (OAIC) recently released its Notifiable Data Breaches Report for the period of January to June 2024. The...
Kali Linux, the go-to operating system for penetration testers and cybersecurity professionals, has rolled out its 2024.3 release. Packed with significant updates and transitions,...
South Africa's Information Regulator (IR) has sent a strong message to organizations handling personal information with its recent enforcement notices against prominent entities like...
The rapid advancement of Artificial Intelligence (AI) is reshaping industries and revolutionizing how we approach problem-solving and innovation. However, this technological progress comes with...
On September 16, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) launched the Federal Civilian Executive Branch (FCEB) Operational Cybersecurity Alignment (FOCAL) Plan. The...
The fight against cyber threats is an ever-evolving battleground, with attackers constantly developing new and sophisticated methods. To combat this growing menace, leading technology...
In a world increasingly driven by innovation, Apple's Vision Pro augmented reality headset has garnered immense attention for its cutting-edge technology. However, a recent...
As artificial intelligence continues to shape the technological landscape, concerns around data privacy, transparency, and ethical use of AI technology remain at the forefront....
On September 12, 2024, Fortinet, a leading cybersecurity company, confirmed a data breach after a hacker claimed to have stolen 440GB of sensitive data...
In the face of the 2024 election cycle, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have released...
Data centres have become the backbone of the digital economy, storing and processing vast amounts of sensitive data—from personal photos and financial information to...
In an era where cyber threats are increasingly sophisticated and persistent, organizations worldwide are reevaluating their approach to security. Traditional perimeter-based defenses are proving...