In a case that is sending shockwaves across the cybersecurity industry, a U.S.-based ransomware negotiator has admitted to secretly collaborating with cybercriminals turning from trusted...
A newly uncovered cyber-espionage campaign is drawing attention across the security community after researchers discovered a stealthy browser-based backdoor targeting Ukrainian organizations.
Security analysts from...
A newly disclosed vulnerability at the heart of modern AI infrastructure is sending shockwaves across the cybersecurity industry raising urgent questions about...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
Cybersecurity professionals were recently alerted to a significant threat involving the Palo Alto Networks Expedition migration tool. Multiple vulnerabilities have been identified in the...
In an increasingly connected world, the landscape of cyber threats continues to evolve, with Distributed Denial of Service (DDoS) attacks becoming more frequent and...
The official website of Nigeria’s National Bureau of Statistics (NBS), www.nigerianstat.gov.ng, has remained inaccessible for three weeks following a reported cyberattack. The prolonged downtime...
In an alarming escalation of cyber threats, a sophisticated cyber espionage campaign known as EAGERBEE has been identified targeting governmental entities and ISPs in...
In an era where digital transformation is accelerating at breakneck speed, the intersection of artificial intelligence (AI) and cybersecurity has become a battleground of...
Distributed Denial of Service (DDoS) attacks have become one of the most disruptive tools in a hacker’s arsenal. Designed to flood networks, servers, and...
Large Language Models (LLMs) like ChatGPT, Bard, and others have transformed industries with their ability to generate coherent and contextually relevant text. However, their...
In an era dominated by digital transformation, networks form the backbone of modern businesses and public services. However, the threat of Denial of Service...
A recent discovery by Stratus Security has brought to light critical vulnerabilities within Microsoft 365, exposing sensitive data across industries such as finance, healthcare,...
As the world increasingly relies on digital platforms, the stakes in cybersecurity have never been higher. Governments, corporations, and citizens alike are grappling with...
In an era where the internet underpins virtually every aspect of modern life, the integrity and availability of online services are paramount. Yet, one...
Drones, or unmanned aerial vehicles (UAVs), have transformed industries, offering solutions for logistics, surveillance, agriculture, and more. However, as drone technology evolves, so do...
German automobile manufacturer Volkswagen is the new victim of Data Breach. This breach has highlighted the growing concerns with Automobile cybersecurity. As vehicles become...
On December 24, 2024, Senegal’s Housing Bank (“Banque de l’Habitat du Sénégal,” or BHS) became the victim of a significant cyberattack, leaving critical banking...
Data Loss Prevention (DLP) refers to a set of technologies and processes designed to monitor, detect, and prevent unauthorized transmission or access to sensitive...
In the ever-evolving landscape of cyber threats, attackers continuously refine their tactics to bypass security measures and exploit vulnerabilities. The FLUX#CONSOLE campaign is a...
In the ever-evolving landscape of cyber threats, a new and insidious campaign has emerged, leveraging fake CAPTCHA verifications to distribute infostealer malware. Dubbed “DeceptionAds,”...
The second half of 2024 has been a tumultuous period in the cybersecurity landscape. ESET's latest Threat Report provides a comprehensive overview of the...