Enhanced Version of the BlackGuard Stealer Spotted in the Wild
A new variant of the BlackGuard stealer has been discovered in the wild, with new features such as USB propagation,…
A new variant of the BlackGuard stealer has been discovered in the wild, with new features such as USB propagation,…
The City of Toronto announced a data breach caused by GoAnywhere attacks. Clop ransomware, the gang responsible for exploiting the…
In today’s digital age, cybersecurity is more important than ever before. Unfortunately, cybercriminals are constantly finding new ways to infiltrate…
EXECUTIVE SUMMARY: Reverse tabnabbing, also known simply as tabnabbing, is a form of phishing that involves deceiving a victim into…
This week, we discuss ransomware attacks on Ferrari and the Dole Food Company, another TikTok ban – this time by…
Microsoft’s Granular Delegated Admin Privileges (GDAP) is a way of assigning specific administrative permissions to individuals or groups within an…
In an exclusive interview with David Hobbs, a fraud expert at Check Point, Conor Burke, the co-founder and CTO of…
Cybersecurity researchers found that Lionsgate, an entertainment industry giant, exposed the IP addresses and viewing habits of its subscribers. The…
Perfect forward secrecy in TLS 1.3 is what helps to prevent the encrypted session data you’ve sent or received from…
Read on for the eyeZy review. Phone monitoring software makes it easy to keep an eye on children, spouses, employers,…