For continuously evaluating the resilience of end-users to phishing and similar social engineering attacks, researchers from the Ben-Gurion University (BGU) of Israel have developed a framework. This new approach is based on actual data gathered... Read more
An advanced persistent threat group also known as the Guardians of Peace or Whois Team, The Lazarus group has updated the arsenal with a new weapon that is as perilous as any digital threat that we have known. Researchers have once again spotted... Read more
The ripple effects of a cyber attack on a third party vendor are felt far and long in the supply chain, with various organizations suffering due to it. Something similar transpired in the case of Blackbaud, a provider of software and cloud hosti... Read more
A new feature-rich malware that can encrypt files on any system running PHP has been found by researchers, making it a high-risk threat for Windows, macOS, and Linux web servers. This new malware is called Ensiko and is a web shell written in PH... Read more
Even though Bluetooth is one of the most underrated features of modern-day mobile phones, yet seldom we find a phone that lacks this feature even today. Bluetooth is a short-range wireless connection feature that’s an integral element of modern-... Read more