The United Kingdom is making strides in enhancing its cyber resilience with the introduction of a new Cyber Security and Resilience Bill. This significant legislative measure aims to bolster compliance requirements for approximately 1,000 organizations across the UK, expanding on the EU’s NIS2 D
The first quarter of 2025 witnessed an extraordinary wave of crypto theft, with over $1.67 billion in digital assets stolen, representing a staggering 303% increase from the previous quarter. This alarming surge was documented in CertiK's Hack3d: Q1 2025 Report, which detailed 197 security
In an era where cyber threats continue to evolve at an alarming rate, a sophisticated Phishing-as-a-Service (PhaaS) platform named ‘Morphing Meerkat’ has been identified by Infoblox Threat Intel. This platform has demonstrated its capability to spoof over 100 brands, effectively gathering user cre
In the evolving landscape of cybersecurity threats, Morphing Meerkat has emerged as a formidable adversary. This clandestine threat actor operates a sophisticated phishing-as-a-service (PhaaS) platform that ingeniously exploits DNS mail exchange (MX) records. Morphing Meerkat’s platforms generate p
In a groundbreaking study, academic researchers from the Florida Institute for Cybersecurity and North Carolina State University have unveiled critical vulnerabilities in both open source and commercial LTE and 5G implementations which could lead to significant disruptions in cellular networks.
Cloudflare has ushered in significant improvements to its Access service, focusing on bolstering secure access to private applications. These enhancements represent the company's commitment to streamlining network operations and heightening security standards for organizations by leveraging