Google and Mozilla this week released Chrome and Firefox software updates to resolve multiple vulnerabilities in both browsers, including high-severity memory safety bugs.
Bazel, an open-source software used for automation of building and testing, has been discovered with a critical supply chain vulnerability
What is the difference between Vulnerability Assessment and Penetration Testing?Vulnerability Assessment focuses on identifying and classifying vulnerabilities in a system, while Penetration Testing involves actively exploiting vulnerabilities to assess the real-world impact. How often should VAPT be conducted?The frequency of …
Ukrainian cybersecurity authorities have disclosed that the Russian state-sponsored threat actor known as Sandworm was inside telecom operator Kyivstar’s systems at least since May 2023.
The Iranian nation-state actor known as MuddyWater has leveraged a newly discovered command-and-control (C2) framework called MuddyC2Go in its attacks on the telecommunications sector in Egypt, Sudan, and Tanzania
The Iranian threat actor known as Tortoiseshell has been attributed to a new wave of watering hole attacks that are designed to deploy a malware dubbed IMAPLoader.
Malicious actors have begun to actively exploit a recently disclosed critical security flaw impacting Atlassian Confluence Data Center and Confluence Server, within three days of public disclosure.
New assessment focuses on how AI will impact the efficacy of cyber operations and the implications for the cyber threat over the next two years.
Remote desktop software maker AnyDesk disclosed on Friday that it suffered a cyber attack that led to a compromise of its production systems.
In 2024, an era where organisations and individuals increasingly operate online, the landscape of cybercrime is evolving rapidly. India, a burgeoning hub for fintech, has experienced a significant surge in cybercrime










