Chinese Hacker Group TAG-74 Launches Multi-Year Campaign Targeting South Korean Organizations
A persistent and sophisticated cyber-espionage campaign carried out by…
Kansas City Cyberattack Disrupts Services: Security This Day Updates You
Kansas found itself at the center of a cyberattack that disrupted…
PAID Posts
Business Spotlight
CertifID Secures $20 Million to Fortify its Fight Against Wire Fraud
CertifID, a trailblazing company that has been making waves in the cybersecurity industry with its innovative…
2023’s Top 10 Cybersecurity News Channels and Podcasts – must have’s for Cybersecurity Professionals
We've compiled a list of 2023's top 10 cybersecurity news channels and podcasts that are essential for anyone…
Connect
Stay in the Loop

Daily Security Tips
Learning Center
the Cloudware Exclusive
Free Guides
the latest
Recent Articles
Taiwanese national sentenced to 30 years for running darknet Incognito Market
A Taiwanese national was sentenced to 30 years in U.S. prison for his role as an administrator of Incognito Market, a popular dark…
Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models
Microsoft on Wednesday said it built a lightweight scanner that it said can detect backdoors in open-weight large language models…
DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files
Threat hunters have disclosed details of a new, stealthy malware campaign dubbed DEAD#VAX that employs a mix of "disciplined…
Research: Predator spyware can turn off Apple indicators showing when microphone, camera are in use
Spyware linked to the surveillance of politicians and activists around the world can block iOS camera and microphone recording…
China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns
Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law…
Orchid Security Introduces Continuous Identity Observability for Enterprise Applications
An innovative approach to discovering, analyzing, and governing identity usage beyond traditional IAM controls.
The Challenge:…