Security researchers have identified Mirax, a sophisticated Remote Access Trojan (RAT) that is redefining mobile malware by transforming infected smartphones into residential proxy nodes, enabling...
Cisco has issued a critical security advisory warning of an authentication bypass vulnerability in Cisco Catalyst SD-WAN Controller and Cisco Catalyst SD-WAN Manager that...
A new wave of highly targeted cyberattacks is putting hospitals, local governments, and even defense-linked operators at risk leveraging deception, advanced malware,...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
In a significant move, the United States Department of Justice (DOJ) has taken down the infrastructure behind Predator, a powerful spyware tool used to...
The recent news that hackers behind the February 2024 attack on Change Healthcare, a major healthcare IT provider, allegedly received a $22 million ransom...
In a landmark agreement, the UAE Cyber Security Council and the International Telecommunication Union (ITU) have joined forces to enhance global cybersecurity capacity. This...
The Cybersecurity and Infrastructure Security Agency (CISA) recently added a single new entry to its Known Exploited Vulnerabilities (KEV) Catalog, raising concerns about the...
Cybersecurity researchers have identified a concerning tactic employed by the cybercriminal group TA577, highlighting a potential vulnerability within the NTLM (NT LAN Manager) authentication...
The world of artificial intelligence (AI) is not immune to cyber threats. Researchers have recently discovered a novel and concerning attack method: a self-propagating...
News of a major data breach at Chunghwa Telecom, Taiwan's largest telecommunications provider, has sent shockwaves across the nation.
Suspected Chinese hackers are believed to...
The Middle East is setting the pace for email security with a surprising surge in the adoption of Domain-based Message Authentication, Reporting & Conformance...
German law enforcement continues to disrupt online criminal marketplaces with the recent takedown of "Crimemarket,” a platform facilitating the trade of drugs, weapons, and...
European consumer groups have reignited the debate surrounding online privacy with a recent complaint against Meta, the company behind Facebook, Instagram, and WhatsApp.
The...
In a proactive move to bolster cybersecurity in the United Arab Emirates (UAE), the UAE Cybersecurity Council has launched the "National Campaign for Cybersecurity."...
A recent cyberattack by the notorious Lazarus Group targeting Windows systems has raised serious concerns about a previously unknown vulnerability.
This article explores the...
Attention developers using JetBrains TeamCity On-Premises! A recent discovery of critical security vulnerabilities poses a significant risk of server takeover by malicious actors.
This...
The recent cyber attack on the Companies and Intellectual Property Commission (CIPC) of South Africa, which exposed the personal information of millions of individuals...
The cybersecurity landscape faces a renewed challenge with the resurfacing of Phobos ransomware, a strain that has been targeting critical infrastructure entities in the...
The past few days have seen a surge in cyberattacks targeting European entities, with the hacktivist collective NoName057 claiming responsibility.
This article delves into...
The recent discovery of an open-source Remote Access Trojan (RAT) named "Xeno RAT" on GitHub has sparked concerns within the cybersecurity community.
While the...
Somalia recently took a significant step towards safeguarding the privacy of its citizens with the official launch of its Data Protection Authority (DPA) on...
The National Institute of Standards and Technology (NIST) recently announced the official release of the Cybersecurity Framework (CSF) 2.0. This long-awaited update to the...
In a recent report, the White House Office of the National Cyber Director (ONCD) has stressed the critical importance of eliminating memory safety vulnerabilities...