Chinese Hacker Group TAG-74 Launches Multi-Year Campaign Targeting South Korean Organizations
A persistent and sophisticated cyber-espionage campaign carried out by…
Kansas City Cyberattack Disrupts Services: Security This Day Updates You
Kansas found itself at the center of a cyberattack that disrupted…
PAID Posts
Business Spotlight
CertifID Secures $20 Million to Fortify its Fight Against Wire Fraud
CertifID, a trailblazing company that has been making waves in the cybersecurity industry with its innovative…
2023’s Top 10 Cybersecurity News Channels and Podcasts – must have’s for Cybersecurity Professionals
We've compiled a list of 2023's top 10 cybersecurity news channels and podcasts that are essential for anyone…
Connect
Stay in the Loop

Daily Security Tips
Learning Center
the Cloudware Exclusive
Free Guides
the latest
Recent Articles
Georgia healthcare company data breach impacts more than 620,000
A cyberattack last year on a prominent Georgia-based healthcare company leaked the sensitive information of 626,540 people,…
APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities
Indian defense sector and government-aligned organizations have been targeted by multiple campaigns that are designed to compromise…
Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms
It's Patch Tuesday, which means a number of software vendors have released patches for various security vulnerabilities impacting…
Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments
Intentionally vulnerable training applications are widely used for security education, internal testing, and product demonstrations.…
Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days
Microsoft on Tuesday released security updates to address a set of 59 flaws across its software, including six vulnerabilities that…
SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits
Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies on the Internet Relay Chat…