News
Ukraine is confronting a new cyberattack vector from Russian military intelligence (GRU) connected hackers that is targeting local governments. The Computer Emergency Response Team of Ukraine (CERT-UA ...
Celebrating Republic Day: Honoring Top 26 Indian CISOs and Their Pioneering Cybersecurity Leadership These 26 Indian Chief Information Security Officers (CISOs) stand as visionary leaders, diligently ...
Meet the top cybersecurity influencers of 2024, driving industry trends, strategies, and awareness initiatives for a safer digital world.
Learn how to start a cyber security company : from crafting a business plan and securing certifications to building a strong team.
Netflix’s Finest: 7 Must-Watch Cybersecurity Shows That Redefine Thrill Discover the top cybersecurity shows on Netflix, diving deep into real-world scandals and speculative futures, offering insights ...
The group declared cyberattack on Israeli universities via post on dark web, citing it as a response to Israel's alleged genocidal campaign in Gaza.
New ‘SpiderX’ Ransomware Emerges as Successor to Notorious Diablo Phant0m described SpiderX as incorporating all the features of Diablo, with additional functionalities designed to make it more ...
Encina Wastewater Authority Allegedly Becomes Latest Victim of BlackByte Ransomware The threat actor in question, the BlackByte ransomware group, has also shared some sample documents with its claims ...
India and Pakistan might have reached a status quo of ceasefire but the two neighbors are still going hard at each other in the digital realm-- the cyberspace.
FBI Warns of RansomHub: Over 200 Victims Targeted RansomHub's ransom notes typically do not specify an initial ransom demand or provide direct payment instructions.
The NCSC Q3 2024 Report highlights a 58% rise in New Zealand cyber incidents, revealing phishing, credential harvesting, and new security threats.
A Shift From Browsers to Enterprise Targets: 2024 Zero-Day Exploitation Analysis While the total number of zero-days dropped in 2024, Google's data points to a continued evolution in adversary ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results