There was an unintended bug introduced in version 104 of Google Chrome. It has been found in the bug that…
In the South China Sea, Chinese threat actors have targeted wind turbine fleets and Australian government agencies as a means…
Hackers classified as TA558 have been increasing their activities since the beginning of this year. There has been an increase…
There has been a surge in cyberespionage attacks levied by Cozy Bear (aka APT29 and Nobelium), a Russian cyberespionage group…
Google has been targeted with the largest DDoS attack in history against one of its customers. An attack on one…
Google Chrome released a new security update for Windows, Linux & Mac users and an update for a new high…
In a hacking attempt carried out by a security researcher, Lennert Wouters, at the Belgian university KU Leuven, the Starlink…
The SDLC (Software Development Life Cycle is a framework) describes the various steps in software development. It covers the planning…
In the context of phishing attacks, a BazarCall style attack is a form of targeted phishing that uses a call-back…
Endpoint detection and response (EDR) is a form of security solution that offers real-time visibility into anomalous endpoint behavior by…