Cyber Security
The new strategy released this week looks to address longstanding challenges in the cyber workforce – but it will require extensive cooperation from the...
Hi, what are you looking for?
The new strategy released this week looks to address longstanding challenges in the cyber workforce – but it will require extensive cooperation from the...
Exfiltration of data from disposed electronic devices has been one of the various techniques used by threat actors for stealing sensitive information about an organization. This...
The plan includes measures for improving cybersecurity knowledge at all levels of education and improving how the federal government attracts, hires and pays cybersecurity...
Spywares are software that is used as a surveillance application to collect sensitive information from victims and send it to the person who installed the application....
IPv4 addresses have been on the verge of extinction ever since the last decade. The boom of IoT (Internet of Things) and Cloud service...
Website of Israel’s largest oil refinery operator, BAZAN Group is inaccessible from most parts of the world as threat actors claim to have hacked the Group’s cyber...
Google has published its annual 0-day vulnerability report, presenting in-the-wild exploitation stats from 2022 and highlighting a long-standing problem in the Android platform that...
All appointments for Swiss (Schengen) tourist and transit visas have been cancelled across the UK. TLScontact, the Swiss government’s chosen IT provider for facilitating visa applicants...
Pyongyang’s growing reliance on cybercrimes to circumvent international sanctions should push the U.S. and its allies to fully enforce existing sanctions and review whether...
Using a vulnerability in MOVEit Transfer, hackers gained access to 8 to 11 million individuals’ ‘Users Data’ protected health information. Maximus, a US government contracting...