A new warning from the U.S. cybersecurity authorities has revealed a large-scale campaign by Russian intelligence-linked actors targeting commercial messaging applications (CMAs) not by breaking...
Dubai, UAE - February 4, 2026.Artificial intelligence is reshaping cybersecurity faster than many organizations can adapt and that reality was front and center during...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
At GITEX Africa 2025 in Morocco, cybersecurity giant Kaspersky unveiled alarming findings from its latest Africa Cyberthreat Landscape Report, revealing a 14% increase in...
In a stark reminder of the evolving threat landscape, Palo Alto Networks has recently reported a surge in brute-force login attempts targeting PAN-OS GlobalProtect...
On April 10, 2025, Fortinet issued an urgent security advisory detailing a sophisticated post-patching exploit in FortiGate devices. Cybercriminals are leveraging a newly uncovered...
In today’s rapidly evolving digital landscape, artificial intelligence (AI) applications are pushing technological boundaries while simultaneously introducing new vulnerabilities. Recently, security researchers identified ten...
On April 11, 2025, the decentralized finance (DeFi) community was shaken by a significant exploit targeting MorphoBlue, a prominent DeFi protocol. An attacker, identified...
A critical vulnerability has been identified in the popular SureTriggers WordPress plugin, affecting over 100,000 active installations. This vulnerability enables unauthenticated attackers to create...
A significant cybersecurity incident, the U.S. Department of the Treasury's Office of the Comptroller of the Currency (OCC) disclosed that unauthorized actors had accessed...
In May 2024, Operation Endgame marked a significant milestone in the global fight against cybercrime, leading to the dismantling of major botnets such as...
In an era where generative AI and automation are transforming cybersecurity and cybercrime AkiraBot stands as a prime example of how malicious actors are...
Cybercrime has no borders, and its impact is especially felt in developing regions where digital infrastructure is evolving faster than security policies. In response,...
A sophisticated wave of ransomware activity has recently shaken multiple sectors globally, exploiting a previously unknown vulnerability in Microsoft’s Common Log File System (CLFS)....
The 2025 State of Secrets Sprawl report by GitGuardian reveals an alarming escalation in credential exposure, with 23.7 million new secrets detected in public...
SonicWall has issued an urgent warning following the public release of proof-of-concept (PoC) exploits targeting a critical authentication bypass vulnerability (CVE-2024-53704) in its SonicOS...
The European Commission has launched a sweeping new internal security strategy, "ProtectEU," aimed at bolstering the EU’s resilience against cyber threats, hybrid warfare, and...
A decisive blow to one of the most disturbing facets of cybercrime, international law enforcement agencies have successfully taken down KidFlix, a notorious child...
In a startling revelation for the cybersecurity community, Kaspersky researchers have identified a dangerous new variant of the infamous Android trojan Triada. This iteration...
On July 15, 2025, Canon Inc. issued an urgent service notice disclosing a critical out-of-bounds vulnerability (CVE-2025-1268) affecting multiple printer drivers for its Production...
Apple finds itself under scrutiny once more due to its controversial privacy practices. The French competition authority, Autorité de la concurrence, has imposed a...
On March 25, 2025, VMware (a Broadcom subsidiary) issued VMSA-2025-0005, disclosing a high-severity authentication bypass vulnerability (CVE-2025-22230) in VMware Tools for Windows. With a...