On 1 July 2025, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned Aeza Group, a Russia‑based bulletproof hosting service, for enabling ransomware,...
On 30 May 2025, Malaysian police confirmed that the official WhatsApp account of Home Minister Datuk Seri Saifuddin Nasution Ismail was compromised through a...
In today's data-driven business landscape, Enterprise Resource Planning (ERP) software plays a critical role. It manages core functionalities like finance, inventory, human...
In a troubling development, the notorious Andariel hacking group, a North Korean-based cybercriminal organization, has intensified its efforts targeting U.S. businesses, shifting from its...
In today’s rapidly evolving digital landscape, the effectiveness of a security operations strategy is crucial to maintaining the integrity of businesses, protecting sensitive data,...
The National Cyber Security Agency (ANCS) has issued an urgent warning to the public, highlighting the rising threat of cyberattacks that target internet users...
Africa is on the cusp of a digital revolution, with mobile connectivity, online services, and tech-savvy youth driving economic growth. However, with this growth...
Following a record-breaking edition in 2023, GITEX GLOBAL, the world’s largest technology event, returns to Dubai for its 44th edition from October 14-18, 2024....
The Irish Data Protection Commission (DPC) has levied a €91 million fine against Meta Platforms Ireland Limited (MPIL) for breaches of the General Data...
In the ever-evolving world of cryptocurrency, scams are becoming increasingly sophisticated. One recent case stands out: a malicious app disguised as the popular crypto...
Product security has become an essential aspect of cybersecurity, especially in the age of IoT, smart devices, and complex software applications. This interview aims...
Wiz Research has uncovered a critical vulnerability (CVE-2024-0132) in the NVIDIA Container Toolkit, widely used for AI applications in both cloud and on-premise environments....
As hybrid cloud environments become the backbone of modern enterprise infrastructure, cybercriminals have adapted their tactics to target these systems. The latest threat, dubbed...
In a significant step toward curbing cybercrime, the U.S. Department of Justice (DOJ) has charged two Russian nationals in connection with running billion-dollar money...
Ransomware-as-a-Service (RaaS) has become a prominent threat in the cybersecurity landscape, allowing anyone with basic technical skills to deploy sophisticated ransomware attacks. This new...
In the ever-evolving mobile threat landscape, Android malware continues to push the boundaries of sophistication and stealth. One malware family, in particular, has gained...
Ransomware continues to evolve, with threat actors constantly seeking innovative ways to bypass detection and maximize damage. One of the latest ransomware variants, RansomHub,...
A recent discovery has raised alarm bells in the cybersecurity community: a vulnerability in ChatGPT's macOS application that could allow malicious actors to exploit...
In a world where cyber threats are constantly evolving, swift and decisive action is crucial for safeguarding digital assets and customer trust. Recently, MoneyGram...
In an era where children are growing up in an increasingly digital world, their access to the internet offers endless opportunities for learning, entertainment,...
Cybercriminals are continuously evolving their methods, and one of the latest phishing tactics involves impersonating Human Resources (HR) departments. By targeting employees with seemingly...
The rapid growth of digital banking has revolutionized the financial sector, offering unprecedented convenience and accessibility to customers. However, this digital transformation comes with...