Dependency Review GitHub Action scans users' pull requests for dependency changes and will raise an error if any new dependencies…
This post provides a timeline of the events related to the Russian invasion of Ukraine from the cyber security perspective.…
NB65 hacking group created its ransomware based on the leaked source code of the Conti ransomware and targets Russia. According…
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free…
Facebook/Meta said Russia-linked threat actors are attempting to use the social network against Ukraine with hate speech, bullying, and fake…
A massive DDoS attack took down Finnish government websites while Ukrainian President Zelenskyy addressed Finland's members of parliament (MPs). On…
Experts discovered malicious Android apps on the Google Play Store masqueraded as antivirus solutions spreading the SharkBot Trojan. Researchers from the…
China-linked threat actors continue to target Indian power grid organizations, most of the attacks involved the ShadowPad backdoor. Recorded Future's…
Experts warn of a Mirai-based botnet exploiting the recently discovered Spring4Shell vulnerability in attacks in the wild. Trend Micro Threat…
Which are the most important cybersecurity measures that businesses can take to protect themselves in the cloud era? We are…
This website uses cookies.