Encrypted messaging platform Signal has confirmed that a series of targeted phishing attacks have resulted in the takeover of several user accounts, including those belonging...
eScan has confirmed a temporary security incident affecting part of its update infrastructure, after unauthorized access to a regional update server resulted in the...
Artificial intelligence is rapidly becoming embedded in cybersecurity workflows from threat hunting to penetration testing. But relying on cloud-based AI services introduces...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
South Korea’s Personal Information Protection Commission (PIPC) has imposed a 21.6 billion won ($15 million) fine on Meta for the unauthorized collection of sensitive...
In an alarming twist for cybersecurity, threat actors have leveraged Ethereum smart contracts to execute a supply chain attack that distributes multi-platform malware across...
In a recent discovery, cybersecurity researchers have identified a new Android banking trojan called "ToxicPanda," originating in Asia and now spreading across Europe and...
Ransomware attacks have become an escalating crisis, hitting organizations globally with devastating speed and impact. From financial losses to reputational damage, the fallout of...
Japan’s highly anticipated cybersecurity bill has encountered delays amid the political uncertainty following the country’s recent general elections. Initially intended to strengthen Japan’s cyber...
With cyber threats evolving in scope and complexity, 2024 has seen a remarkable surge in cyberattacks across industries and borders. The recent Cyber Gauge...
In an era of growing cyber threats and increasing digital interconnectivity, international collaboration has become essential for effective cybersecurity. CTM360, a leading provider of...
To bolster AI-driven cybersecurity, SentinelOne has deepened its strategic collaboration with Amazon Web Services (AWS). This partnership leverages generative AI and Amazon Bedrock’s advanced...
In today’s complex cybersecurity environment, the concept of "Zero Trust" has become a cornerstone in defense strategies. Rooted in the principle of “never trust,...
As the threat landscape evolves, cybersecurity has become a top priority for governments worldwide. In Côte d'Ivoire, efforts to protect citizens' personal data and...
Qatar recently hosted the third GCC Ministerial Cybercrime Committee meeting, bringing together cybersecurity leaders from across the Gulf Cooperation Council (GCC) countries. Held in...
Oman recently took a significant step forward in its cybersecurity journey with the inauguration of the Hadatha Centre. Established by the Ministry of Transport,...
German law enforcement agencies have dealt a significant blow to the criminal underground economy. Authorities recently announced the arrests of two individuals involved in...
As organizations race to adopt cloud technologies, the advantages of scalability, flexibility, and cost- efficiency are clear. However, rapid cloud adoption without the proper...
In the ever-evolving landscape of cybersecurity, organizations face an increasing barrage of sophisticated threats. As cybercriminals become more adept at evading traditional security measures,...
In recent years, the cybersecurity landscape has witnessed an alarming rise in ransomware attacks, particularly through Ransomware-as-a-Service (RaaS) platforms. These platforms allow even novice...
In today’s digital landscape, the rapid adoption of cloud and hybrid environments has transformed how organizations operate and store data. However, this shift has...
Italy faces one of its most significant espionage scandals, uncovering a dark web of clandestine dossiers and unauthorized surveillance. A network targeting high-ranking officials,...
To reinforce its data security posture, Proofpoint Inc., a prominent name in cybersecurity and compliance, has entered a definitive agreement to acquire Normalyze, a...
As a strategic move to enhance Saudi Arabia's cybersecurity capabilities, the National Cybersecurity Authority (NCA) is actively receiving applications for Tier 2 licenses for...