Since mid-2023, a cybercriminal cluster dubbed CL‑CRI‑1014 has been targeting financial institutions across Africa using open-source tools like PoshC2 and Classroom Spy exploiting them for...
03 June 2025 - A once regionally focused Android banking Trojan called Crocodilus has surged onto the global stage with advanced capabilities. Newly discovered...
In today's data-driven business landscape, Enterprise Resource Planning (ERP) software plays a critical role. It manages core functionalities like finance, inventory, human...
In a significant blow to international cybercrime, a high-profile Belarusian cybercriminal has been apprehended by Spanish law enforcement authorities. Maksym Silnikau, also known as...
WordPress, the world's most popular content management system (CMS), powers millions of websites. While plugins often take the spotlight for security concerns, the vulnerabilities...
WordPress, the world’s most popular content management system (CMS), powers millions of websites. While plugins often take the spotlight for security concerns, WordPress themes,...
The United Nations has recently adopted a landmark, yet highly contested, treaty aimed at combating cybercrime. This global agreement, while intended to address the...
The relentless pace of digital transformation has driven organizations to embrace cloud computing at an unprecedented rate. While the cloud offers numerous benefits, it...
A recently discovered attack, dubbed "Dark Skippy," poses a significant threat to the security of cryptocurrency wallets and signing devices. The attack, detailed in...
A recently discovered malicious tool dubbed "ONNX Bot" is posing a significant threat to Microsoft 365 users worldwide. This sophisticated piece of malware has...
Australian mining giant Evolution Mining has fallen victim to a ransomware attack, disrupting operations and raising concerns about the vulnerability of critical infrastructure. The...
A newly discovered vulnerability, identified as CVE-2024-6768, has been uncovered in the Common Log File System (CLFS.sys) driver of Windows operating systems. This critical...
Security researchers at Bitdefender have uncovered a series of critical vulnerabilities in the photovoltaic (PV) system management platforms operated by Chinese companies Deye and...
As organizations transition towards more secure and modern IT infrastructures, integrating Zero Trust Architecture (ZTA) into legacy systems presents a unique set of challenges....
FreeBSD, the popular open-source operating system, has issued critical security updates to address a high-severity vulnerability in OpenSSH, the widely used secure shell protocol....
Daniel Ehrenreich, BSc. is a consultant and lecturer acting at Secure Communications and Control Experts (SCCE) and periodically teaches and presents at industry conferences...
In a significant development that underscores the growing tension between technological innovation and data privacy, X, formerly known as Twitter, has temporarily suspended the...
A recently discovered malicious Python package, masquerading as a legitimate Solana library, has been found stealing cryptocurrency wallet keys from unsuspecting users. The rogue...
Ranjinni Joshe is Senior Cloud Security Specialist and World Wide Women in Cybersecurity Bangalore Chapter Leader having diverse experience in Embedded, BFSI, Salesforce and...
A newly discovered malicious campaign has infected over 300,000 users with malware disguised as Chrome and Edge extensions. The campaign, orchestrated by a sophisticated...
Patch management is a critical component of any robust cybersecurity strategy. It involves the process of identifying, assessing, testing, and deploying software updates or...
In a disturbing revelation, cybersecurity researchers have uncovered a coordinated campaign targeting university professors worldwide, orchestrated by a North Korean espionage group. The campaign,...
In a disturbing new development, cybercriminals are employing a sophisticated phishing campaign targeting Google users, distributing malware disguised as legitimate authenticator apps. This deceptive...