Lazarus Group Targets Job Seekers With ClickFix Tactic to Deploy GolangGhost Malware

The North Korean threat actors behind Contagious Interview have adopted the increasingly popular ClickFix social engineering tactic to…

Sparring in the Cyber Ring: Using Automated Pentesting to Build Resilience

Hands up. Chin tucked. Knees bent. The bell rings, and both boxers meet in the center and…

New SLAP and FLOP CPU Attacks Expose Data From Apple Computers, Phones

Academic researchers have disclosed the details of two new CPU side-channel attacks impacting millions of phones,…

Smiths Group Scrambling to Restore Systems Following Cyberattack

British engineering giant Smiths Group is scrambling to restore systems that were knocked offline in response…

Rockwell Patches Critical, High-Severity Vulnerabilities in Several Products

Rockwell Automation on Tuesday published six new security advisories to inform customers about several critical- and…

Cato Networks Hires Security Vet Karl Soderlund As New Channel Chief

Cato Networks has hired a veteran of the cybersecurity channel, Karl Soderlund, as its new global…

Zest AI Expands Credit Union Fraud Protection Through Integration with Sync1 Systems

 Zest AI, the leader in AI lending technology, today announced an expanded partnership with Sync1 Systems, an…

Authorities Seize Domains of Popular Hacking Forums in Major Cybercrime Crackdown

An international law enforcement operation has dismantled the domains associated with various online platforms linked to…

Lightning AI Studio Vulnerability Could’ve Allowed RCE via Hidden URL Parameter

Cybersecurity researchers have disclosed a critical security flaw in the Lightning AI Studio development platform that, if successfully…

SOC Analysts – Reimagining Their Role Using AI

The job of a SOC analyst has never been easy. Faced with an overwhelming flood of…