T-Mobile claims it discovered that threat actors had gained limited access to information from a few accounts. This is the year’s second instance of a data...
CISA recently included three actively exploited vulnerabilities in the wild in its KEV (Known Exploited Vulnerabilities) catalog. The three actively exploited vulnerabilities are detected in:- Here below we...
New Android spyware, BouldSpy detected recently by Lookout Threat Lab, linked with moderate certainty to Iran’s Law Enforcement Command of the Islamic Republic of Iran. Named...
Police confiscated the illicit “Monopoly Market” dark web marketplace and arrested 288 people buying or selling drugs on the dark web as part of an operation...
Airtag, Smart tags are devices used to find the location of lost items like Luggage, keys, purses, or mobile phones. These location trackers are very handy...
Protecting employees from harmful content was a far more straightforward task once upon a time. COVID-19 changed all of that in an instant. The new hybrid...
The cybersecurity security researchers at Sophos recently detected the “Dragon Breath” APT group (aka Golden Eye Dog, APT-Q-27) using complex DLL sideloading variations to avoid detection....
Offline since February, the new system will have improved cybersecurity countermeasures. A critical U.S. Marshals Service computer system that has been offline since February after suffering a ransomware...
Recently, Zyxel, the networking equipment manufacturer, has issued critical security patches for its firewall devices to fix a vulnerability allowing RCE on the affected systems. This...
Introduction As organizations move towards digitization, security has become a significant part of their operations. Software-Defined Perimeter (SDP) and Virtual Private Networks (VPN) are two of the most extensively used security...