Rogue Nations: An Assessment of State-Sponsored Cyberattacks.
By Jacques de la Riviere, CEO, Gatewatcher Few prefixes excite the cybersecurity market as much as ‘state-sponsored.’ The label immediately…
By Jacques de la Riviere, CEO, Gatewatcher Few prefixes excite the cybersecurity market as much as ‘state-sponsored.’ The label immediately…
An open-source Android malware named 'Ratel RAT' is widely deployed by multiple cybercriminals to attack outdated devices, some aiming to…
An open-source Android malware named 'Rafel RAT' is widely deployed by multiple cybercriminals to attack outdated devices, some aiming to…
Rear Admiral Daniel Hagari has been trending on X this week. He's the spokesperson for the Israel Defense Forces. You've…
Today, the Biden administration has announced an upcoming ban of Kaspersky antivirus software and the pushing of software updates to…
CNN had some major breaking news this week. Apparently, we’re not a republic. “President Biden is billing his re-election campaign…
A scathing report by Australia's Information Commissioner details how misconfigurations and missed alerts allowed a hacker to breach Medibank and steal…
By Joseph Hladik, Cyber Group Lead, Neya Systems From perception and sensing to mapping and localization, both off-road and on-road…
A new phishing campaign uses HTML attachments that abuse the Windows search protocol (search-ms URI) to push batch files hosted on…
Establishing a clear process for developers to respond to critical CVEs is essential for having a rapid and coordinated response.