A previously unnamed ransomware has rebranded under the name ‘Trigona,’ launching a new Tor negotiation site where they accept Monero…
Blog
Acer has fixed a high-severity vulnerability affecting multiple laptop models that could enable local attackers to deactivate UEFI Secure Boot…
Every employee needs to be aware of cyber security risks and the basic actions they may need to take, such…
Heading into 2023, the economic outlook looks gloomy and cybersecurity professionals will be faced with challenges that come with any…
If you’ve ever considered overclocking your graphics card, there’s a good chance MSI’s ever-popular overclocking utility Afterburner has crossed your…
Google has released an emergency security update for the desktop version of the Chrome web browser, addressing the eighth zero-day…
A threat actor associated with cyberespionage operations since at least 2017 has been luring victims with fake VPN software for…
Chief information security officers (CISOs) have an enormous job of protecting their organisations from multiple threats daily. If you ask…
A set of five exploitable vulnerabilities in Arm’s Mali GPU driver remain unfixed months after the chip maker patched them,…
A new collection of malicious Android apps posing as harmless file managers had infiltrated the official Google Play app store,…

