News

An executive compromised through a family-targeted scam can quickly lead to broader breaches in corporate security.
Cyber attribution and threat actor naming conventions have sparked long-lasting debates in cyber spheres, at least since ...
Cyber-attacks using HijackLoader and DeerStealer have been identified exploiting phishing tactics via ClickFix ...
Government websites, financial institutions, telecommunications companies, and critical infrastructure are among the variety ...
A half-day workshop is scheduled for June 19. The workshop will focus on findings from the Turing Institute’s Cyber Threat ...
Threats will only continue to become more complex as new technologies advance. According to a 2024 Microsoft report, its threat intelligence department now tracks “more than 1,500 unique threat groups ...
Google warns Salesforce customers about vishing attacks by hackers impersonating IT support to lure employees into connecting ...
THIS PRESS RELEASE AND THE 2025 CYBER SURVEY: APPLICATION SECURITY AT A BREAKING POINT ARE PROVIDED FOR INFORMATIONAL ...
Himmat Singh is back with his team to tackle an unusual threat in Special Ops 2, streaming July 11 on JioHotstar.
Cyberattacks against retailers around the world are on the rise, leaving some store shelves empty and customer data at risk.
Storytellers and created by Neeraj Pandey, Special Ops 2 is set to redefine modern-day espionage on JioHotstar ...
PurpleHaze and ShadowPad campaigns targeted over 70 organizations globally, including government and critical infrastructure ...