Featured

Global Cyber Situational Awareness Csa Market Outlook 2026-2033: Key Type and Application Segments Fuel 12.8% CAGR Growth

11-01-2025 07:25 PM CET | Aerospace & Defense New Jersey, US State: "The global Cyber Situational Awareness Csa market in the Information Technology and Telecom...

NULLHAT 2025 Convenes Hackers, Coders, and Cyber Warriors at UM6P-1337

Morocco’s first live hacking event kicked off yesterday at the Mohammed VI Polytechnic University (UM6P) 1337 campus in Benguerir, bringing together cybersecurity enthusiasts, ethical...

ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability

The Australian Signals Directorate (ASD) has issued a bulletin about ongoing cyber attacks targeting unpatched Cisco IOS XE devices in the country with a...

Inside the British Library, two years on from devastating cyber attack

Home to more than 170 million items, including Magna Carta, the British Library is one of the world’s largest and most impressive book collections. However,...

Real estate under attack: AI-powered cyber threats and strategic defense

Cybercriminals now exploit the very tools and workflows driving modern real estate — e-signatures, mobile approvals, and remote closings — using artificial intelligence to...

Cyber agencies produce ‘long overdue’ best practices for securing Microsoft Exchange Server

Best practices include a focus on hardening user authentication and access, ensuring strong network encryption, and minimizing application attack surfaces. 

Cyber agencies produce ‘long overdue’ best practices for securing Microsoft Exchange Server

Best practices include a focus on hardening user authentication and access, ensuring strong network encryption, and minimizing application attack surfaces. 

Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach

The notorious Akira ransomware group announced on October 29, 2025, that it successfully breached the systems of Apache OpenOffice, exfiltrating a staggering 23 gigabytes...

CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware

CISA has issued an urgent alert about a critical use-after-free vulnerability in the Linux kernel, tracked as CVE-2024-1086. This vulnerability, hidden within the netfilter:...

Latest articles