News

Malicious dbgpkg package on PyPI poses as a debugging utility but acts as a delivery mechanism for a stealthy backdoor ...
RomethemeKit For Elementor is a widely used toolkit that enhances Elementor website builders by providing ready-to-use ...
Civil society groups and academics are calling for the EU's GDPR to remain unchanged following the EU Commission's plans to ...
Making a Type 1 vendor decision shouldn’t be done lightly - it can be incredibly costly to be stuck with a vendor that no longer aligns with the needs of your cybersecurity program. That’s why buyers ...
The head of Google Cloud’s Office of the CISO, Nick Godfrey, tells Infosecurity about the biggest challenges security leaders are experiencing today ...
An Alabama man has been handed 14 months behind bars after hacking an SEC social media account to post fake news about ...
The UK government says that hackers accessed a “large amount” of personal information in attack on Legal Aid Agency ...
Throughout 2024, the landscape shifted dramatically: GitHub surged to the top of the most abused cloud services with 15%. This overtook Microsoft OneDrive, which fell to second place at 10%, followed ...
The FBI has warned about an ongoing smishing and vishing scheme using AI deepfakes to impersonate US officials ...
An analysis by Robert Walters found there are around 17,000 cybersecurity vacancies in the UK currently, with organizations ...
In Operation RoundPress, the compromise vector is a spearphishing email leveraging an XSS vulnerability to inject malicious ...
New data from Darktrace showed that cyber-attacks targeting healthcare organizations increased in intensity in 2024 ...