HomeTopics 2

Topics 2

spot_imgspot_imgspot_imgspot_img

Access Granted: How Device Code Phishing Is Fueling Account Takeovers

Phishing is no longer just about fake login pages and stolen passwords. According to new research from Proofpoint, threat actors are increasingly abusing a...

Malicious VS Code Extensions Hide Malware in Fake PNG File, Triggering New Supply-Chain Threat

A new malicious campaign targeting Visual Studio Code (VS Code) extensions has been uncovered - and it's one of the most technically deceptive supply-chain...

AmiViz Sets the Stage for Next-Gen Cybersecurity at Black Hat MEA 2025 with AI-Powered Innovations

AmiViz, widely recognized as one of the Middle East’s most influential cybersecurity-focused value-added distributors is gearing up for a major presence at Black Hat...

SentinelOne Sets the Stage for AI-Driven Cyber Defense at Black Hat MEA 2025

SentinelOne is gearing up to take center stage at Black Hat Middle East & Africa 2025, bringing with it a powerful message: AI is...

Brazilian Cybercrime Wave: New Malware Spreads Through WhatsApp in Highly Targeted Banking Attack

A major cybercrime campaign is sweeping across Brazil this time riding directly through victims’ WhatsApp Web sessions. Security researchers at K7 Labs revealed a...

Sturnus: The New Mobile Banking Malware That Silently Defeats WhatsApp, Telegram, and Signal Encryption

A newly identified Android banking trojan, Sturnus, has entered the cybercrime ecosystem with a level of sophistication that security researchers are calling “a turning...

Open Letter to Samsung: A Growing Outcry Over Forced Israeli-Founded Bloatware in the WANA Region

According to a newly published open letter by SMEX - a leading digital rights organization in the region - AppCloud is far more than...

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Must read

spot_imgspot_imgspot_imgspot_img