Cybercriminals are now deploying remote access Trojans (RATs) under the guise...
Read MoreReplacing EDR/NGAV with Autonomous XDR Makes a Big Difference for Small Security Teams
The attack surface is virtually expanding before our eyes. Protecting assets...
Read MoreA $50,000 Bug Could’ve Allowed Hackers Access Any Microsoft Account
Microsoft has awarded an independent security researcher $50,000 as part of...
Read MoreURGENT — 4 Actively Exploited 0-Day Flaws Found in Microsoft Exchange
Microsoft has released emergency patches to address four previously undisclosed security flaws in...
Read MoreNew Chrome 0-day Bug Under Active Attacks – Update Your Browser ASAP!
Exactly a month after patching an actively exploited zero-day flaw in Chrome, Google...
Read MoreResearchers Unearth Links Between SunCrypt and QNAPCrypt Ransomware
SunCrypt, a ransomware strain that went on to infect several targets...
Read MoreNew ‘unc0ver’ Tool Can Jailbreak All iPhone Models Running iOS 11.0 – 14.3
A popular jailbreaking tool called “unc0ver” has been updated to support...
Read MoreGootkit RAT Using SEO to Distribute Malware Through Compromised Sites
A framework notorious for delivering a banking Trojan has received a...
Read MoreWhy do companies fail to stop breaches despite soaring IT security investment?
Let’s first take a look back at 2020! Adding to the...
Read More