Security researchers have uncovered a technique that allows attackers to abuse Cortex XDR’s Live Response feature as a covert command-and-control (C2) channel - effectively turning...
On 28 January 2026, Abu Dhabi will host one of the most discreet yet strategically significant cybersecurity gatherings of the year. The Cyber Envoy’s...
In a year where cybercriminals increasingly weaponized artificial intelligence to launch more convincing scams and stealthier malware, Google has dramatically scaled its...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
The United States Department of Justice (DOJ) has escalated its legal battle against TikTok, urging a federal appeals court to uphold a law mandating...
In a significant move to bolster the cybersecurity of India's critical infrastructure, the National Power Training Institute (NPTI) and the Indian Institute of Technology...
In a significant counteroffensive against cybercrime, French authorities have initiated a "disinfection operation" aimed at removing the notorious PlugX malware from infected systems across...
A sophisticated phishing attack targeting India Post users has been uncovered, with strong indications pointing towards a Chinese state-sponsored hacking group. The campaign, leveraging...
In a shocking development that sent ripples through the cryptocurrency community, WazirX, a prominent Indian cryptocurrency exchange, has unveiled its recovery plan following a...
In a bold and brazen attack, a sophisticated cybercrime group has launched a large-scale assault targeting multiple Russian banks. The attack, which commenced on...
The ConfusedFunction vulnerability in Google Cloud Platform (GCP) highlighted a critical security issue arising from misconfigurations in the Cloud Build service. While Google has...
In a significant victory against online exploitation, Meta, the parent company of Instagram, has announced the removal of over 63,000 accounts linked to Nigerian...
In a recent discovery that underscores the complexities of cloud security, researchers have uncovered a critical privilege escalation vulnerability within Google Cloud Platform (GCP)....
In a significant development in the global fight against cybercrime, the U.S. Department of Justice (DoJ) has indicted a North Korean hacker for orchestrating...
The cyber threat landscape is constantly evolving, with adversaries adapting their strategies to maximize their impact. Recent findings indicate a shift in tactics by...
In a significant data breach incident, BMW has confirmed that the personal data of approximately 14,000 Hong Kong customers was compromised. The unauthorized access...
The recent CrowdStrike outage, which impacted millions of Windows devices worldwide, has underscored the limitations of cyber insurance policies in covering massive losses stemming...
On July 19th, 2024, a significant IT outage impacted millions of Windows devices worldwide, with CrowdStrike, a leading endpoint protection platform, taking responsibility for...
Phishing attacks remain a prevalent threat in the cybersecurity landscape, with cybercriminals constantly devising new techniques to steal sensitive information. Recently, researchers at SlashNext...
In a significant cybersecurity breach, Leidos, a prominent IT services provider for the Pentagon, has confirmed the theft and subsequent leak of internal documents....
In a shocking turn of events, a prominent pro-Palestinian actor has been implicated in a six-day Distributed Denial of Service (DDoS) attack targeting multiple...
Across Africa, a digital revolution is underway, fueled by the power of open-source software (OSS). From fostering financial inclusion to empowering education, OSS offers...
On July 19th, 2024, a major IT outage hit CrowdStrike, a leading cloud-based endpoint security platform. This incident, affecting an estimated 8.5 million Windows...