A team of researchers today unveils two critical security vulnerabilities it discovered in Dell Wyse Thin clients that could have potentially allowed attackers to remotely execute...
(Reuters) – Tech giants including Microsoft and Google on Monday joined Facebook’s legal battle against hacking company NSO, filing an amicus brief in federal court that...
WASHINGTON (Reuters) -Dozens of email accounts at the U.S. Treasury Department were compromised by the powerful hackers responsible for a wide-ranging espionage campaign against U.S. government...
Operational Technology (OT) systems and Internet of Things (IoT) devices are core to the manufacturing, healthcare, and energy sectors. Recently, it has been identified that a...
Palo Alto’s Unit42 research team has recently found hacking group AridViper (aka APT-C-23) dropping a new malware to target victims in the Middle Eastern region. This...
Recently, Subway UK confirmed that its marketing system was hacked and it was used to send out the notorious Trickbot malware-laden phishing emails to its customers. The story...
Threat actors exploit zero-day threats to make an impact before the organizations get a chance to patch them. Recent zero-day attacks In recent months, several well-known...
Meet Issak Davidovich, Vice President of Research and Development at C2A Security. He has more than 16 years experience of leading embedded security teams. He joined...
In response to ongoing cybersecurity events, the National Security Agency (NSA) released a Cybersecurity Advisory “Detecting Abuse of Authentication Mechanisms.” The advisory provides guidance to National Security System...
There is an old saying that “There is strength in numbers.” But what happens when that strength is on the side of the intent to do harm? ...