Software Supply Chain Attacks: The Hidden Cybersecurity Threat Organizations Can’t Ignore
As organizations increasingly rely on third-party vendors and suppliers, supply chain attacks have become...
October 14th, 2024
Continue ReadingDigital Skimming: The Emerging Threat of Online Theft and How to Safeguard Yourself
In an era when many people shop online on a regular basis, the convenience of digital transactions is...
October 7th, 2024
Continue ReadingUnderstanding Advanced Persistent Threats (APT): The Silent Threat to Modern Cybersecurity
In the evolving landscape of cybersecurity, Advanced Persistent Threats (APT) have emerged as one of...
September 27th, 2024
Continue ReadingPassword Hashing
The Use of cryptography in Password Storage Cryptography is a technique for secure communication...
September 25th, 2024
Continue ReadingThe Rise of Quishing Attacks: A New Challenge in Cybersecurity
These days, hackers are not a fixed group as they continue to adapt with the new technologies as well...
September 12th, 2024
Continue ReadingUsing AI for Enterprise Cyber Security Management
In the ever changing digital world of today, businesses are depending more and more on cutting edge technologies...
September 9th, 2024
Continue ReadingSocial Media and AI: Is it Safe?
Artificial Intelligence (AI) is changing the way society interacts, communicates, and generates and consumes...
August 30th, 2024
Continue ReadingVulnerability Management
What is Vulnerability Management? Vulnerability management can be defined as a continual...
July 29th, 2024
Continue ReadingCyber Security Strategy – Guide to Managers and Leaders
All of the seasoned Cyber Security Leaders have done strategies for their organizations few times over...
July 29th, 2024
Continue ReadingBalancing Security with Individual Rights
In navigating the modern world, there exists a complex interplay between security and individual rights....
June 26th, 2024
Continue ReadingISO 27002:2022
Background The ISO 27001 is the international standard for Information Security management from...
May 21st, 2024
Continue ReadingCultivating Good Security Habits in the Workplace
In the modern era of technology, our workplaces lean heavily on digital tools, making us more vulnerable...
May 13th, 2024
Continue ReadingStrengthening SME Cybersecurity in 2024 A Proactive Approach
SMEs are facing a growing threat from cyberattacks, with the average cost of a data breach rising sharply....
January 4th, 2024
Continue ReadingUnraveling Microsoft Outlook’s Zero-Click Vulnerabilities Triggered by Sound Files
In a recent revelation, security researchers at Akamai disclosed two critical security vulnerabilities...
December 23rd, 2023
Continue ReadingThe Rising Threat of Ransomware in the Middle East and Africa
In recent times, the Middle East and Africa (ME&A) have witnessed a notable increase in cyberattacks,...
December 8th, 2023
Continue ReadingNavigating the Challenges of Data De-Identification in the Digital Age
In the realm of data privacy, companies face a delicate balancing act between safeguarding consumer privacy,...
December 4th, 2023
Continue ReadingJapan’s Latest MalDoc in PDF Attack
In a digital world where security breaches continue to make headlines, staying ahead of cybercriminals'...
August 30th, 2023
Continue ReadingChrome New Feature Alerts Malicious Extensions
In the fast-paced world of technology, convenience often comes hand in hand with risks. Google, the tech...
August 21st, 2023
Continue ReadingNorwegian Ministries Hacked: Zero-Day Alert!
Twelve Norwegian ministries fell victim to a cyberattack by threat actors who exploited a zero-day vulnerability...
July 26th, 2023
Continue ReadingDocker Hub Secrets: Container Security Wake-Up
In a groundbreaking study, researchers at the RWTH Aachen University in Germany have shed light on a...
July 18th, 2023
Continue ReadingHCA Healthcare Disclose Data Breach
HCA Healthcare, one of America's largest healthcare facility owners and operators, recently disclosed...
July 12th, 2023
Continue ReadingTrojanized Super Mario Bros Game Installer
In a recent discovery, researchers from Cyble Research and Intelligence Labs (CRIL) uncovered a concerning...
June 27th, 2023
Continue ReadingOver 100,000 ChatGPT User Accounts on Dark Web
In a world growing ever reliant on digital technologies and AI-based services, a significant cybersecurity...
June 21st, 2023
Continue ReadingRansomware Group Strikes: A Major Bank in Spain
Globalcaja, one of the leading banks in Spain, recently fell victim to a ransomware attack orchestrated...
June 6th, 2023
Continue ReadingTypes of Phishing Attacks: Recognize and Defend
In today's digital age, where technology dominates our daily lives, online security has become a paramount...
May 23rd, 2023
Continue ReadingMicrosoft Teams: Lateral movement abuse exposed
Researchers from the security company Proofpoint looked into the potential misuse of a Teams account...
May 18th, 2023
Continue ReadingWhatsApp introduce Chat Lock
'Chat Lock,' a new WhatsApp privacy feature that enables users to prevent others from viewing their most...
May 16th, 2023
Continue ReadingApple, Google team up vs. location-tracking
A proposed industry-wide protocol being developed by Apple and Google is intended to address safety concerns...
May 4th, 2023
Continue ReadingGoogle issue warnings on a new scam
Users of Gmail are advised to keep a close eye on their inboxes for any believable scams that may attempt...
April 27th, 2023
Continue ReadingUS, UK warn of hackers exploiting Cisco routers
Cybersecurity and intelligence organizations in the United Kingdom and the United States have issued...
April 20th, 2023
Continue ReadingNew Emerging ransomware: RORSCHACH
One of the fastest-encrypting ransomware strains, known as "Rorschach," has been identified by security...
April 6th, 2023
Continue ReadingCrown Resorts hacked, ransom demanded
Crown representatives have admitted to falling victim to the Fortra GoAnywhere ransomware attack. An...
March 30th, 2023
Continue ReadingTikTok Bans from Uk government devices
With immediate effect, the United Kingdom will prohibit TikTok from being used on any government-owned...
March 23rd, 2023
Continue ReadingShein’s Android app breached clipboard privacy.
According to a blog post by Microsoft Threat Intelligence, the Shein shopping platform app owned by a...
March 16th, 2023
Continue ReadingLastPass breach caused by engineer’s outdated Plex software.
The LastPass breach was brought on by an engineer who neglected to update Plex on his personal computer....
March 9th, 2023
Continue ReadingLastPass Reveals more details on the breach
Threat actors obtained user information and partially encrypted password vault data, according to a compromise...
March 2nd, 2023
Continue ReadingWhat to do after Twitter eliminates SMS 2FA for non-Blue users?
On 15th Feburary 2022, Twitter on a blog post said “Phone-number based 2FA be used - and abused - by...
February 23rd, 2023
Continue ReadingPepsi Bottling Ventures suffers data breach
The largest privately owned bottler of Pepsi-Cola products in the United States, Pepsi Bottling Ventures,...
February 16th, 2023
Continue ReadingNew Russian info-stealer attacks target Ukraine.
Security experts have seen a Russian hacking organization, which was responsible for the catastrophic...
February 9th, 2023
Continue ReadingUsers of GitHub Desktop and Atom must take action
Unidentified attackers reportedly gained access to certain of GitHub's development and release planning...
February 2nd, 2023
Continue Reading€5.5 million fined on WhatsApp
Meta's WhatsApp has been fined by Irish Data Protection Commission (DPC) for violating the General Data...
January 24th, 2023
Continue Reading$5.4 million fined on TikTok
TikTok UK and TikTok Ireland have been fined €5,000,000 (Around $5.4 Million) by France's data protection...
January 17th, 2023
Continue ReadingMicrosoft January 2023 Patch Tuesday
On 11th January 2023 was the January Patch Tuesday, and a zero-day vulnerability and 98 flaws were fixed. ...
January 12th, 2023
Continue ReadingGoogle to Resolve User Location Tracking Lawsuits
In order to resolve two lawsuits launched by Indiana and Washington, D.C. about its "deceptive" location...
January 3rd, 2023
Continue ReadingLastPass admits on password vaults been stolen
On 22nd December 2022 LastPass revealed that after entering its cloud storage earlier this year using...
December 27th, 2022
Continue ReadingClient-side encryption for Gmail for workspace
Google recently revealed that it is extending customer access to client-side encryption in Gmail online....
December 20th, 2022
Continue ReadingMultiple Chrome extensions uses Browser Hijackers
Around two million users were found to have been infected by browser hijackers employing malicious Chrome...
December 8th, 2022
Continue ReadingPhishing Campaign Targets Black Friday Season
A continuous spear-phishing attack that takes advantage of Black Friday and Cyber Monday has been detected...
December 1st, 2022
Continue ReadingTwitter verified account targeted in Phishing Campaigns
Twitter is now charging $8 a month for Twitter Blue and account verification. With this many phishing...
November 22nd, 2022
Continue Reading800,000 Malaysian Voters Compromised
The news organization New Straits Times announced on November 11, 2022, that there had allegedly been...
November 17th, 2022
Continue ReadingDaixin Team the ransomware and data extortion group Targets Healthcare Sector
The US Federal Bureau of Investigation, the Cybersecurity and Infrastructure Security Agency, and the...
November 10th, 2022
Continue ReadingMicrosoft Storage Location Expose Customers’ Information
One of Microsoft clients' critical data was exposed due to a storage server configuration error, according...
November 1st, 2022
Continue ReadingThroughout Europe, Russian spoofing campaigns are disseminating false information on Ukraine
A significant amount of social media posts and accounts that were spoofing Russian information was taken...
October 25th, 2022
Continue ReadingMalware for Windows SideWalk adapted for Linux
It was discovered that a Linux version of the SideWalk backdoor had been developed, allegedly by the...
October 6th, 2022
Continue ReadingQueen Elizabeth II’s death used in credential harvesting
Proofpoint’s Threat Insight Team reveled on 14th September 2022 that threat actors are employing phishing...
September 28th, 2022
Continue ReadingStarbucks Suffers Data Breach
The Straits Times published an article on a data breach involving a US coffee shop company Starbucks...
September 23rd, 2022
Continue ReadingRansomware Rise – All you need to know
What is Ransomware? Ransomware is a form of malware made to prevent users or organizations from accessing...
September 16th, 2022
Continue ReadingUber internal system breached
Following news that a hacker had gained access to Uber's network and forced it to shut down various internal...
September 16th, 2022
Continue ReadingCustomer email addresses of DigitalOcean were compromised by a recent MailChimp breach
A security advisory about a hack on its email service provider MailChimp that had an impact on its clients...
September 14th, 2022
Continue ReadingSharkBot Malware Returned to Google Play Store
SharkBot malware has returned in a fresh and upgraded edition, according to a post published by security...
September 7th, 2022
Continue ReadingLast Pass Source Code Exposed in Data Breach
On 25th August 2022, Last pass company published a data breach notification affirming that threat actors...
August 31st, 2022
Continue ReadingVLC Media Player website banned in India
VLC Media Player one of India’s most popular media players has being banned in the country. User can’t...
August 25th, 2022
Continue ReadingCisco Confirms Breached By Ransomware Group
Cisco has confirmed that the Yanluowang ransomware group was hacked their data. This happens when the...
August 12th, 2022
Continue ReadingTwitter confirms that a data breach has affected millions of accounts
On 5th August 2022, Twitter released a security advisory saying, "In January 2022, we received a report...
August 8th, 2022
Continue ReadingNew Android Apps in the Play Store Contain Malware
In the recent, write up by Dr.Web on virus activity on mobile devices he mentioned that he has discovered...
July 28th, 2022
Continue ReadingIs Microsoft Teams down?
On July 21st on the official Microsoft twitter account for update on certain service incidents said that...
July 21st, 2022
Continue ReadingHarvest Credentials on Fraudulent Facebook Pages
Computer Emergency Response Team of Ukraine (CERT-UA) has released an article reporting that number of...
July 20th, 2022
Continue Reading$8.1 million stole in Uniwasp phishing attack
Uniswap a decentralized cryptocurrency exchange has loss millions of dollars in a phishing attack. On...
July 19th, 2022
Continue ReadingTwitter and YouTube Accounts of British Military Hacked by threat actors
On 4th July 2022, the Britain’s Ministry of Defense tweeted “The breach of the Army’s Twitter and...
July 14th, 2022
Continue ReadingThreat actors are still Exploiting Log4Shell vulnerability
Cybersecurity & Infrastructure Security Agency (CISA) and the United States Coast Guard Cyber Command...
July 7th, 2022
Continue ReadingU.S. FCC commissioner has requests google and Apple to take off TikTok from app stores
On 24th June 2022, Brendan Carr the Federal Communication Commission Commissioner has sent a letter to...
July 1st, 2022
Continue ReadingTop 25 Most Dangerous Software Weaknesses – 2022 CWE
On June 28th 2022, Mitre shared the 2022 Common Weakness Enumeration (CWE™) Top 25 Most Dangerous Software...
June 29th, 2022
Continue ReadingEmail bug lets attackers bypass Security
As notified by Cisco of the security flaw (tracked as CVE-2022-20798) was found in the external authentication...
June 16th, 2022
Continue ReadingSymbiote Malware infects all running processes on Linux Systems
A newly found malware known as Symbiote infects all running processes on compromised systems, steals...
June 10th, 2022
Continue ReadingRCE Vulnerability shambles Google Chrome Dev Channel
It has been reported that a recently patched severe remote code execution vulnerability flaw in the V8...
June 2nd, 2022
Continue ReadingZoom flaw enables users get hacked just by sending a Message
Our everyday video conferencing service Zoom was able to resolve as many as 4 security vulnerabilities,...
May 31st, 2022
Continue ReadingIf you interact, you get caught: A Chatbot phishing campaign
Phishing campaigns are usually executed on emails, whatever links included are commonly delivered through...
May 25th, 2022
Continue Reading21 Year old jailed for stealing Cryptocurrency by luring victims on Snapchat
Online crypto scams and fraudulent schemes are hardly anything new. However, this specific case of a...
May 16th, 2022
Continue ReadingLincoln College suffers Ransomware attack
Lincoln College is to shut down after 157 years due to ransomware attack? Lincoln College is situated...
May 11th, 2022
Continue ReadingWhatsApp is DOWN
According to many user reports, it seems that WhatsApp is experiencing outages. Reports state that the...
April 29th, 2022
Continue ReadingQuantum ransomware Strikes
The Quantum ransomware, 1st discovered in August of 2021 was seen spreading fast attacks that escalate...
April 26th, 2022
Continue ReadingPassword stealing malware for Sale
A new malware named BlackGuard is now available on Hacker forums! Now available for sale on numerous...
April 1st, 2022
Continue ReadingHonda Bug gives access to your Vehicles
Can hackers access your vehicle? Selected Honda and Acura car models have been affected with a recent...
March 28th, 2022
Continue ReadingA huge hit on OKTA
Many organizations that rely on Okta may have been collateral damage due to the big cyber hit on the...
March 25th, 2022
Continue ReadingCan anyone create a Fake Chrome Browser Windows?
A phishing kit and campaign has been released that allows red teamers and 'wannabe' cybercriminals to...
March 21st, 2022
Continue ReadingUbisoft states that a “security” incident resets Staff Passwords
Ubisoft, the well known video game developer confirms that they suffered a "cyber security incident"...
March 15th, 2022
Continue ReadingHow dangerous is Emotet?
Introduction Emotet is widely considered one of the world’s most dangerous global malware families...
March 10th, 2022
Continue ReadingSharkBot malware plays ‘hide and seek’ as an Android antivirus in Google Play Store
SharkBot banking malware has infiltrated the Google Play Store, the official Android app...
March 6th, 2022
Continue Reading‘Electron Bot’ infiltrates Microsoft Store via clones of Popular Games
Our Favorite Games are turning in to Malwares? As unfortunate as it sounds, a malware named Electron...
February 25th, 2022
Continue ReadingTikTok and YouTube shares ‘Your’ Data more than any other App, Take a look at how.
TikTok is sharing User Data more than other Social Media Platform, Study Claims. As we all know, one...
February 14th, 2022
Continue ReadingApps on your phone, They know a lot
Your mobile phone is accessing lot of data of yours? Are you safe? The average smartphone user these...
November 9th, 2021
Continue ReadingSecurity Operations Centre (SOC) Expectation Vs Reality
Security Operations Centre (SOC) is becoming a hot topic in the market and everyone expects to fight...
October 11th, 2021
Continue ReadingHow Did Facebook Disappear from the Internet?
On 4th October Facebook and its affiliated services WhatsApp and Instagram was reported to be missing...
October 7th, 2021
Continue ReadingHow being open can make you safer
Security by Obscurity is making you Vulnerable. Here's the loopholes of it and real-world examples of...
August 25th, 2021
Continue Reading5 key Considerations for Cyber Security Success
What is the key to Cyber Security Success. It's simple. Cyber security investments are becoming one...
August 25th, 2021
Continue ReadingHow to protect your personal data
If your data is stolen there's no point of it being secure. Insights to General Data Protection Regulation...
August 25th, 2021
Continue Reading3 Biggest Cybersecurity Lies
It's is time for business leaders to see cyberthreats for what they are—enterprise risk management...
August 25th, 2021
Continue Reading5 Key Points in selecting your Security Vendor
Technical and infrastructure readiness is important for all organisations in terms of Cyber. How can...
August 25th, 2021
Continue ReadingAre you Ready for General Data Protection Regulation (GDPR)?
It's the most advanced and people centric cyber security regulation released so far. Here's how your...
August 25th, 2021
Continue Reading3 Reasons why Cyber Security is Complex
A lot of organization try to apply find it complex to solve cybersecurity issues. Here's why. With...
August 25th, 2021
Continue Reading