Encrypted messaging platform Signal has confirmed that a series of targeted phishing attacks have resulted in the takeover of several user accounts, including those belonging...
eScan has confirmed a temporary security incident affecting part of its update infrastructure, after unauthorized access to a regional update server resulted in the...
Artificial intelligence is rapidly becoming embedded in cybersecurity workflows from threat hunting to penetration testing. But relying on cloud-based AI services introduces...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
Wayback Machine (archive.org), an Internet Archive tool that allows users to access archived versions of websites, was hacked by a hacker group. It ended...
As we navigate an increasingly digital world, the importance of encryption in safeguarding personal data and privacy cannot be overstated. In a series of...
In a significant move towards enhancing digital capabilities within the UAE's energy sector, the Emirates Water and Electricity Company (EWEC) has announced a strategic...
As cyber threats continue to escalate across the globe, Singapore is taking proactive steps to fortify its digital defenses. On October 17, 2024, Cisco,...
As cyber threats become more sophisticated and frequent, companies around the world are increasingly partnering with cybersecurity experts to protect their digital infrastructures. In...
A notorious cyber espionage group, Earth Simnavaz, also known as APT34 or OilRig, has ramped up its cyberattacks against government entities in the UAE...
In a move aimed at strengthening the defense against active cyber threats, the Cybersecurity and Infrastructure Security Agency (CISA) has added three new vulnerabilities...
On October 12, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) released a critical document for public...
As cybersecurity threats continue to evolve at an alarming rate, businesses and governments worldwide are turning to AI-powered solutions to stay ahead of adversaries....
In the evolving landscape of cyber threats, attackers are continuously refining their methods, leveraging sophisticated tools and techniques to bypass defenses. Recently, a spear...
A new variant of the notorious FASTCash malware, attributed to North Korea's cyber warfare unit, has emerged targeting Linux-based payment systems. Originally developed to...
Cybercriminals are constantly evolving their methods, and the TrickMo Banking Trojan is a prime example of how malware continues to adapt to evade detection...
In recent years, ransomware has become the preferred weapon of choice for cybercriminals worldwide. While attacks have predominantly targeted resource-rich countries and large corporations,...
On September 9, 2024, a sophisticated cyber attack hit the Ivanti Cloud Services Appliance (CSA), exposing several vulnerabilities in its software. With two of...
5G networks are transforming the way we live and operate, ushering in a new era of ultra-fast connectivity, low latency, and seamless integration of...
A critical vulnerability in Veeam Backup & Replication (CVE-2024-40711) has recently come under active exploitation, with attackers leveraging this flaw to deploy ransomware, steal...
In response to the rising tide of cyber threats, the Australian government has taken a significant step by introducing a comprehensive Cybersecurity Legislation Package...
In an era where artificial intelligence (AI) is revolutionizing industries, it is also being misused by cybercriminals to execute malicious activities on a global...