
After a Hack: How Companies Should Respond
Cyber incidents are no longer rare threats; these days, a cyber incident is practically a matter of certainty,...
April 11th, 2025
Continue Reading
Strategic Cybersecurity Post-Incident Leadership: Navigating the Aftermath and Building Resilience
Cybersecurity breaches can profoundly impact any institution, affecting customer trust, brand reputation,...
April 5th, 2025
Continue Reading
Cybersecurity in Financial Fraud: How Attackers Bypass MFA & Social Engineering Defenses
In an era where financial transactions are increasingly digital, cybercriminals have adapted their tactics...
March 31st, 2025
Continue Reading
The Dark Side of SaaS: Hidden Security Risks in Cloud Applications
Organizations worldwide increasingly rely on Software as a Service (SaaS) application such as Google...
March 24th, 2025
Continue Reading
Security in the Intelligent Age
Introduction We live in an era where intelligence is embedded into everything around us—our homes,...
March 4th, 2025
Continue Reading
The State of Cyber Resilience in 2025
In an era where digital threats are more sophisticated and pervasive than ever, cyber resilience has...
February 20th, 2025
Continue Reading
Decoding Complexity: Understanding and Navigating the Challenges of Modern Systems
In an era where technology, data, and systems are evolving at an unprecedented pace, understanding complexity...
February 7th, 2025
Continue Reading
Navigating the Digital Maze: Understanding Complexity, Disruptions and the Road Ahead in Cyberspace
As cyberspace evolves, it has become a tangled web of rapidly advancing technologies, mounting geopolitical...
January 27th, 2025
Continue Reading
Cybersecurity in the Age of Autonomous Enterprises
In 2025, the concept of autonomous enterprises is no longer a futuristic aspiration but a burgeoning...
January 20th, 2025
Continue Reading
The Paradox of Threat Intelligence: Blessing or Burden
In today's cybersecurity landscape, timely and accurate threat intelligence has become an essential component...
January 10th, 2025
Continue Reading
Social Media Security: Risks, Challenges, and Solutions
Social media security is a vast and critical topic in today's digital landscape. With the proliferation...
December 13th, 2024
Continue Reading
RMM Solutions: Revolutionizing Cybersecurity with Proactive Real-Time Monitoring
In today’s hyper-connected world, businesses operate in a digital battlefield where cyber threats are...
November 29th, 2024
Continue Reading
Cyber Crimes and Legal Measures: Securing Sri Lanka’s Digital Space
In an increasingly interconnected world, cybercrimes are escalating in frequency and sophistication,...
November 26th, 2024
Continue Reading
The Evolution of Vulnerability Management: From Reactive to Proactive Security
In the ever-evolving landscape of cybersecurity, vulnerability management has transformed dramatically....
November 18th, 2024
Continue Reading
Pitfalls in Cybersecurity Training for End Users on Social Engineering Attacks
As technology has advanced, cyberspace has brought tremendous benefits, but it has also opened the door...
October 29th, 2024
Continue Reading
Robotics and AI: Emerging Cyber Threats in Autonomous Systems
As robotics and artificial intelligence (AI) technologies evolve, autonomous systems are becoming integral...
October 23rd, 2024
Continue Reading
Business Benefits of a Better Cybersecurity Strategy
Today's hyperconnected digital environment makes cybersecurity a business necessity rather than merely...
October 18th, 2024
Continue Reading
Software Supply Chain Attacks: The Hidden Cybersecurity Threat Organizations Can’t Ignore
As organizations increasingly rely on third-party vendors and suppliers, supply chain attacks have become...
October 14th, 2024
Continue Reading
Digital Skimming: The Emerging Threat of Online Theft and How to Safeguard Yourself
In an era when many people shop online on a regular basis, the convenience of digital transactions is...
October 7th, 2024
Continue Reading
Understanding Advanced Persistent Threats (APT): The Silent Threat to Modern Cybersecurity
In the evolving landscape of cybersecurity, Advanced Persistent Threats (APT) have emerged as one of...
September 27th, 2024
Continue Reading
Password Hashing
The Use of cryptography in Password Storage Cryptography is a technique for secure communication...
September 25th, 2024
Continue Reading
The Rise of Quishing Attacks: A New Challenge in Cybersecurity
These days, hackers are not a fixed group as they continue to adapt with the new technologies as well...
September 12th, 2024
Continue Reading
Using AI for Enterprise Cyber Security Management
In the ever changing digital world of today, businesses are depending more and more on cutting edge technologies...
September 9th, 2024
Continue Reading
Social Media and AI: Is it Safe?
Artificial Intelligence (AI) is changing the way society interacts, communicates, and generates and consumes...
August 30th, 2024
Continue Reading
Vulnerability Management
What is Vulnerability Management? Vulnerability management can be defined as a continual...
July 29th, 2024
Continue Reading
Cyber Security Strategy – Guide to Managers and Leaders
All of the seasoned Cyber Security Leaders have done strategies for their organizations few times over...
July 29th, 2024
Continue Reading
Balancing Security with Individual Rights
In navigating the modern world, there exists a complex interplay between security and individual rights....
June 26th, 2024
Continue Reading
ISO 27002:2022
Background The ISO 27001 is the international standard for Information Security management from...
May 21st, 2024
Continue Reading
Cultivating Good Security Habits in the Workplace
In the modern era of technology, our workplaces lean heavily on digital tools, making us more vulnerable...
May 13th, 2024
Continue Reading
Strengthening SME Cybersecurity in 2024 A Proactive Approach
SMEs are facing a growing threat from cyberattacks, with the average cost of a data breach rising sharply....
January 4th, 2024
Continue Reading
Unraveling Microsoft Outlook’s Zero-Click Vulnerabilities Triggered by Sound Files
In a recent revelation, security researchers at Akamai disclosed two critical security vulnerabilities...
December 23rd, 2023
Continue Reading
The Rising Threat of Ransomware in the Middle East and Africa
In recent times, the Middle East and Africa (ME&A) have witnessed a notable increase in cyberattacks,...
December 8th, 2023
Continue Reading
Navigating the Challenges of Data De-Identification in the Digital Age
In the realm of data privacy, companies face a delicate balancing act between safeguarding consumer privacy,...
December 4th, 2023
Continue Reading
Japan’s Latest MalDoc in PDF Attack
In a digital world where security breaches continue to make headlines, staying ahead of cybercriminals'...
August 30th, 2023
Continue Reading
Chrome New Feature Alerts Malicious Extensions
In the fast-paced world of technology, convenience often comes hand in hand with risks. Google, the tech...
August 21st, 2023
Continue Reading
Norwegian Ministries Hacked: Zero-Day Alert!
Twelve Norwegian ministries fell victim to a cyberattack by threat actors who exploited a zero-day vulnerability...
July 26th, 2023
Continue Reading
Docker Hub Secrets: Container Security Wake-Up
In a groundbreaking study, researchers at the RWTH Aachen University in Germany have shed light on a...
July 18th, 2023
Continue Reading
HCA Healthcare Disclose Data Breach
HCA Healthcare, one of America's largest healthcare facility owners and operators, recently disclosed...
July 12th, 2023
Continue Reading
Trojanized Super Mario Bros Game Installer
In a recent discovery, researchers from Cyble Research and Intelligence Labs (CRIL) uncovered a concerning...
June 27th, 2023
Continue Reading
Over 100,000 ChatGPT User Accounts on Dark Web
In a world growing ever reliant on digital technologies and AI-based services, a significant cybersecurity...
June 21st, 2023
Continue Reading
Ransomware Group Strikes: A Major Bank in Spain
Globalcaja, one of the leading banks in Spain, recently fell victim to a ransomware attack orchestrated...
June 6th, 2023
Continue Reading
Types of Phishing Attacks: Recognize and Defend
In today's digital age, where technology dominates our daily lives, online security has become a paramount...
May 23rd, 2023
Continue Reading
Microsoft Teams: Lateral movement abuse exposed
Researchers from the security company Proofpoint looked into the potential misuse of a Teams account...
May 18th, 2023
Continue Reading
WhatsApp introduce Chat Lock
'Chat Lock,' a new WhatsApp privacy feature that enables users to prevent others from viewing their most...
May 16th, 2023
Continue Reading
Apple, Google team up vs. location-tracking
A proposed industry-wide protocol being developed by Apple and Google is intended to address safety concerns...
May 4th, 2023
Continue Reading
Google issue warnings on a new scam
Users of Gmail are advised to keep a close eye on their inboxes for any believable scams that may attempt...
April 27th, 2023
Continue Reading
US, UK warn of hackers exploiting Cisco routers
Cybersecurity and intelligence organizations in the United Kingdom and the United States have issued...
April 20th, 2023
Continue Reading
New Emerging ransomware: RORSCHACH
One of the fastest-encrypting ransomware strains, known as "Rorschach," has been identified by security...
April 6th, 2023
Continue Reading
Crown Resorts hacked, ransom demanded
Crown representatives have admitted to falling victim to the Fortra GoAnywhere ransomware attack. An...
March 30th, 2023
Continue Reading
TikTok Bans from Uk government devices
With immediate effect, the United Kingdom will prohibit TikTok from being used on any government-owned...
March 23rd, 2023
Continue Reading
Shein’s Android app breached clipboard privacy.
According to a blog post by Microsoft Threat Intelligence, the Shein shopping platform app owned by a...
March 16th, 2023
Continue Reading
LastPass breach caused by engineer’s outdated Plex software.
The LastPass breach was brought on by an engineer who neglected to update Plex on his personal computer....
March 9th, 2023
Continue Reading
LastPass Reveals more details on the breach
Threat actors obtained user information and partially encrypted password vault data, according to a compromise...
March 2nd, 2023
Continue Reading
What to do after Twitter eliminates SMS 2FA for non-Blue users?
On 15th Feburary 2022, Twitter on a blog post said “Phone-number based 2FA be used - and abused - by...
February 23rd, 2023
Continue Reading
Pepsi Bottling Ventures suffers data breach
The largest privately owned bottler of Pepsi-Cola products in the United States, Pepsi Bottling Ventures,...
February 16th, 2023
Continue Reading
New Russian info-stealer attacks target Ukraine.
Security experts have seen a Russian hacking organization, which was responsible for the catastrophic...
February 9th, 2023
Continue Reading
Users of GitHub Desktop and Atom must take action
Unidentified attackers reportedly gained access to certain of GitHub's development and release planning...
February 2nd, 2023
Continue Reading
€5.5 million fined on WhatsApp
Meta's WhatsApp has been fined by Irish Data Protection Commission (DPC) for violating the General Data...
January 24th, 2023
Continue Reading
$5.4 million fined on TikTok
TikTok UK and TikTok Ireland have been fined €5,000,000 (Around $5.4 Million) by France's data protection...
January 17th, 2023
Continue Reading
Microsoft January 2023 Patch Tuesday
On 11th January 2023 was the January Patch Tuesday, and a zero-day vulnerability and 98 flaws were fixed. ...
January 12th, 2023
Continue Reading
Google to Resolve User Location Tracking Lawsuits
In order to resolve two lawsuits launched by Indiana and Washington, D.C. about its "deceptive" location...
January 3rd, 2023
Continue Reading
LastPass admits on password vaults been stolen
On 22nd December 2022 LastPass revealed that after entering its cloud storage earlier this year using...
December 27th, 2022
Continue Reading
Client-side encryption for Gmail for workspace
Google recently revealed that it is extending customer access to client-side encryption in Gmail online....
December 20th, 2022
Continue Reading
Multiple Chrome extensions uses Browser Hijackers
Around two million users were found to have been infected by browser hijackers employing malicious Chrome...
December 8th, 2022
Continue Reading
Phishing Campaign Targets Black Friday Season
A continuous spear-phishing attack that takes advantage of Black Friday and Cyber Monday has been detected...
December 1st, 2022
Continue Reading
Twitter verified account targeted in Phishing Campaigns
Twitter is now charging $8 a month for Twitter Blue and account verification. With this many phishing...
November 22nd, 2022
Continue Reading
800,000 Malaysian Voters Compromised
The news organization New Straits Times announced on November 11, 2022, that there had allegedly been...
November 17th, 2022
Continue Reading
Daixin Team the ransomware and data extortion group Targets Healthcare Sector
The US Federal Bureau of Investigation, the Cybersecurity and Infrastructure Security Agency, and the...
November 10th, 2022
Continue Reading
Microsoft Storage Location Expose Customers’ Information
One of Microsoft clients' critical data was exposed due to a storage server configuration error, according...
November 1st, 2022
Continue Reading
Throughout Europe, Russian spoofing campaigns are disseminating false information on Ukraine
A significant amount of social media posts and accounts that were spoofing Russian information was taken...
October 25th, 2022
Continue Reading
Malware for Windows SideWalk adapted for Linux
It was discovered that a Linux version of the SideWalk backdoor had been developed, allegedly by the...
October 6th, 2022
Continue Reading
Queen Elizabeth II’s death used in credential harvesting
Proofpoint’s Threat Insight Team reveled on 14th September 2022 that threat actors are employing phishing...
September 28th, 2022
Continue Reading
Starbucks Suffers Data Breach
The Straits Times published an article on a data breach involving a US coffee shop company Starbucks...
September 23rd, 2022
Continue Reading
Ransomware Rise – All you need to know
What is Ransomware? Ransomware is a form of malware made to prevent users or organizations from accessing...
September 16th, 2022
Continue Reading
Uber internal system breached
Following news that a hacker had gained access to Uber's network and forced it to shut down various internal...
September 16th, 2022
Continue Reading
Customer email addresses of DigitalOcean were compromised by a recent MailChimp breach
A security advisory about a hack on its email service provider MailChimp that had an impact on its clients...
September 14th, 2022
Continue Reading
SharkBot Malware Returned to Google Play Store
SharkBot malware has returned in a fresh and upgraded edition, according to a post published by security...
September 7th, 2022
Continue Reading
Last Pass Source Code Exposed in Data Breach
On 25th August 2022, Last pass company published a data breach notification affirming that threat actors...
August 31st, 2022
Continue Reading
VLC Media Player website banned in India
VLC Media Player one of India’s most popular media players has being banned in the country. User can’t...
August 25th, 2022
Continue Reading
Cisco Confirms Breached By Ransomware Group
Cisco has confirmed that the Yanluowang ransomware group was hacked their data. This happens when the...
August 12th, 2022
Continue Reading
Twitter confirms that a data breach has affected millions of accounts
On 5th August 2022, Twitter released a security advisory saying, "In January 2022, we received a report...
August 8th, 2022
Continue Reading
New Android Apps in the Play Store Contain Malware
In the recent, write up by Dr.Web on virus activity on mobile devices he mentioned that he has discovered...
July 28th, 2022
Continue Reading
Is Microsoft Teams down?
On July 21st on the official Microsoft twitter account for update on certain service incidents said that...
July 21st, 2022
Continue Reading
Harvest Credentials on Fraudulent Facebook Pages
Computer Emergency Response Team of Ukraine (CERT-UA) has released an article reporting that number of...
July 20th, 2022
Continue Reading
$8.1 million stole in Uniwasp phishing attack
Uniswap a decentralized cryptocurrency exchange has loss millions of dollars in a phishing attack. On...
July 19th, 2022
Continue Reading
Twitter and YouTube Accounts of British Military Hacked by threat actors
On 4th July 2022, the Britain’s Ministry of Defense tweeted “The breach of the Army’s Twitter and...
July 14th, 2022
Continue Reading
Threat actors are still Exploiting Log4Shell vulnerability
Cybersecurity & Infrastructure Security Agency (CISA) and the United States Coast Guard Cyber Command...
July 7th, 2022
Continue Reading
U.S. FCC commissioner has requests google and Apple to take off TikTok from app stores
On 24th June 2022, Brendan Carr the Federal Communication Commission Commissioner has sent a letter to...
July 1st, 2022
Continue Reading
Top 25 Most Dangerous Software Weaknesses – 2022 CWE
On June 28th 2022, Mitre shared the 2022 Common Weakness Enumeration (CWE™) Top 25 Most Dangerous Software...
June 29th, 2022
Continue Reading
Email bug lets attackers bypass Security
As notified by Cisco of the security flaw (tracked as CVE-2022-20798) was found in the external authentication...
June 16th, 2022
Continue Reading
Symbiote Malware infects all running processes on Linux Systems
A newly found malware known as Symbiote infects all running processes on compromised systems, steals...
June 10th, 2022
Continue Reading
RCE Vulnerability shambles Google Chrome Dev Channel
It has been reported that a recently patched severe remote code execution vulnerability flaw in the V8...
June 2nd, 2022
Continue Reading
Zoom flaw enables users get hacked just by sending a Message
Our everyday video conferencing service Zoom was able to resolve as many as 4 security vulnerabilities,...
May 31st, 2022
Continue Reading
If you interact, you get caught: A Chatbot phishing campaign
Phishing campaigns are usually executed on emails, whatever links included are commonly delivered through...
May 25th, 2022
Continue Reading
21 Year old jailed for stealing Cryptocurrency by luring victims on Snapchat
Online crypto scams and fraudulent schemes are hardly anything new. However, this specific case of a...
May 16th, 2022
Continue Reading
Lincoln College suffers Ransomware attack
Lincoln College is to shut down after 157 years due to ransomware attack? Lincoln College is situated...
May 11th, 2022
Continue Reading
WhatsApp is DOWN
According to many user reports, it seems that WhatsApp is experiencing outages. Reports state that the...
April 29th, 2022
Continue Reading
Quantum ransomware Strikes
The Quantum ransomware, 1st discovered in August of 2021 was seen spreading fast attacks that escalate...
April 26th, 2022
Continue Reading
Password stealing malware for Sale
A new malware named BlackGuard is now available on Hacker forums! Now available for sale on numerous...
April 1st, 2022
Continue Reading
Honda Bug gives access to your Vehicles
Can hackers access your vehicle? Selected Honda and Acura car models have been affected with a recent...
March 28th, 2022
Continue Reading