Software Supply Chain Attacks: The Hidden Cybersecurity Threat Organizations Can’t Ignore

Software Supply Chain Attacks: The Hidden Cybersecurity Threat Organizations Can’t Ignore

As organizations increasingly rely on third-party vendors and suppliers, supply chain attacks have become...

October 14th, 2024

Continue Reading

Digital Skimming: The Emerging Threat of Online Theft and How to Safeguard Yourself

Digital Skimming: The Emerging Threat of Online Theft and How to Safeguard Yourself

In an era when many people shop online on a regular basis, the convenience of digital transactions is...

October 7th, 2024

Continue Reading

Understanding Advanced Persistent Threats (APT): The Silent Threat to Modern Cybersecurity

Understanding Advanced Persistent Threats (APT): The Silent Threat to Modern Cybersecurity

In the evolving landscape of cybersecurity, Advanced Persistent Threats (APT) have emerged as one of...

September 27th, 2024

Continue Reading

Password Hashing

Password Hashing

The Use of cryptography in Password Storage Cryptography is a technique for secure communication...

September 25th, 2024

Continue Reading

The Rise of Quishing Attacks: A New Challenge in Cybersecurity

The Rise of Quishing Attacks: A New Challenge in Cybersecurity

These days, hackers are not a fixed group as they continue to adapt with the new technologies as well...

September 12th, 2024

Continue Reading

Using AI for Enterprise Cyber Security Management

Using AI for Enterprise Cyber Security Management

In the ever changing digital world of today, businesses are depending more and more on cutting edge technologies...

September 9th, 2024

Continue Reading

Social Media and AI: Is it Safe?

Social Media and AI: Is it Safe?

Artificial Intelligence (AI) is changing the way society interacts, communicates, and generates and consumes...

August 30th, 2024

Continue Reading

Vulnerability Management 

Vulnerability Management 

  What is Vulnerability Management?   Vulnerability management can be defined as a continual...

July 29th, 2024

Continue Reading

Cyber Security Strategy – Guide to Managers and Leaders

Cyber Security Strategy – Guide to Managers and Leaders

All of the seasoned Cyber Security Leaders have done strategies for their organizations few times over...

July 29th, 2024

Continue Reading

Balancing Security with Individual Rights

Balancing Security with Individual Rights

In navigating the modern world, there exists a complex interplay between security and individual rights....

June 26th, 2024

Continue Reading

ISO 27002:2022

ISO 27002:2022

Background   The ISO 27001 is the international standard for Information Security management from...

May 21st, 2024

Continue Reading

Cultivating Good Security Habits in the Workplace

Cultivating Good Security Habits in the Workplace

In the modern era of technology, our workplaces lean heavily on digital tools, making us more vulnerable...

May 13th, 2024

Continue Reading

Strengthening SME Cybersecurity in 2024  A Proactive Approach

Strengthening SME Cybersecurity in 2024 A Proactive Approach

SMEs are facing a growing threat from cyberattacks, with the average cost of a data breach rising sharply....

January 4th, 2024

Continue Reading

Unraveling Microsoft Outlook’s Zero-Click Vulnerabilities Triggered by Sound Files

Unraveling Microsoft Outlook’s Zero-Click Vulnerabilities Triggered by Sound Files

In a recent revelation, security researchers at Akamai disclosed two critical security vulnerabilities...

December 23rd, 2023

Continue Reading

The Rising Threat of Ransomware in the Middle East and Africa

The Rising Threat of Ransomware in the Middle East and Africa

In recent times, the Middle East and Africa (ME&A) have witnessed a notable increase in cyberattacks,...

December 8th, 2023

Continue Reading

Navigating the Challenges of Data De-Identification in the Digital Age

Navigating the Challenges of Data De-Identification in the Digital Age

In the realm of data privacy, companies face a delicate balancing act between safeguarding consumer privacy,...

December 4th, 2023

Continue Reading

Japan’s Latest MalDoc in PDF Attack

Japan’s Latest MalDoc in PDF Attack

In a digital world where security breaches continue to make headlines, staying ahead of cybercriminals'...

August 30th, 2023

Continue Reading

Chrome New Feature Alerts Malicious Extensions

Chrome New Feature Alerts Malicious Extensions

In the fast-paced world of technology, convenience often comes hand in hand with risks. Google, the tech...

August 21st, 2023

Continue Reading

Norwegian Ministries Hacked: Zero-Day Alert!

Norwegian Ministries Hacked: Zero-Day Alert!

Twelve Norwegian ministries fell victim to a cyberattack by threat actors who exploited a zero-day vulnerability...

July 26th, 2023

Continue Reading

Docker Hub Secrets: Container Security Wake-Up

Docker Hub Secrets: Container Security Wake-Up

In a groundbreaking study, researchers at the RWTH Aachen University in Germany have shed light on a...

July 18th, 2023

Continue Reading

HCA Healthcare Disclose Data Breach

HCA Healthcare Disclose Data Breach

HCA Healthcare, one of America's largest healthcare facility owners and operators, recently disclosed...

July 12th, 2023

Continue Reading

Trojanized Super Mario Bros Game Installer

Trojanized Super Mario Bros Game Installer

In a recent discovery, researchers from Cyble Research and Intelligence Labs (CRIL) uncovered a concerning...

June 27th, 2023

Continue Reading

Over 100,000 ChatGPT User Accounts on Dark Web

Over 100,000 ChatGPT User Accounts on Dark Web

In a world growing ever reliant on digital technologies and AI-based services, a significant cybersecurity...

June 21st, 2023

Continue Reading

Ransomware Group Strikes: A Major Bank in Spain

Ransomware Group Strikes: A Major Bank in Spain

Globalcaja, one of the leading banks in Spain, recently fell victim to a ransomware attack orchestrated...

June 6th, 2023

Continue Reading

Types of Phishing Attacks: Recognize and Defend

Types of Phishing Attacks: Recognize and Defend

In today's digital age, where technology dominates our daily lives, online security has become a paramount...

May 23rd, 2023

Continue Reading

Microsoft Teams: Lateral movement abuse exposed

Microsoft Teams: Lateral movement abuse exposed

Researchers from the security company Proofpoint looked into the potential misuse of a Teams account...

May 18th, 2023

Continue Reading

WhatsApp introduce Chat Lock

WhatsApp introduce Chat Lock

'Chat Lock,' a new WhatsApp privacy feature that enables users to prevent others from viewing their most...

May 16th, 2023

Continue Reading

Apple, Google team up vs. location-tracking

Apple, Google team up vs. location-tracking

A proposed industry-wide protocol being developed by Apple and Google is intended to address safety concerns...

May 4th, 2023

Continue Reading

Google issue warnings on a new scam

Google issue warnings on a new scam

Users of Gmail are advised to keep a close eye on their inboxes for any believable scams that may attempt...

April 27th, 2023

Continue Reading

US, UK warn of hackers exploiting Cisco routers

US, UK warn of hackers exploiting Cisco routers

Cybersecurity and intelligence organizations in the United Kingdom and the United States have issued...

April 20th, 2023

Continue Reading

New Emerging ransomware: RORSCHACH

New Emerging ransomware: RORSCHACH

One of the fastest-encrypting ransomware strains, known as "Rorschach," has been identified by security...

April 6th, 2023

Continue Reading

Crown Resorts hacked, ransom demanded

Crown Resorts hacked, ransom demanded

Crown representatives have admitted to falling victim to the Fortra GoAnywhere ransomware attack. An...

March 30th, 2023

Continue Reading

TikTok Bans from Uk government devices

TikTok Bans from Uk government devices

With immediate effect, the United Kingdom will prohibit TikTok from being used on any government-owned...

March 23rd, 2023

Continue Reading

Shein’s Android app breached clipboard privacy.

Shein’s Android app breached clipboard privacy.

According to a blog post by Microsoft Threat Intelligence, the Shein shopping platform app owned by a...

March 16th, 2023

Continue Reading

LastPass breach caused by engineer’s outdated Plex software.

LastPass breach caused by engineer’s outdated Plex software.

The LastPass breach was brought on by an engineer who neglected to update Plex on his personal computer....

March 9th, 2023

Continue Reading

LastPass Reveals more details on the breach

LastPass Reveals more details on the breach

Threat actors obtained user information and partially encrypted password vault data, according to a compromise...

March 2nd, 2023

Continue Reading

What to do after Twitter eliminates SMS 2FA for non-Blue users?

What to do after Twitter eliminates SMS 2FA for non-Blue users?

On 15th Feburary 2022, Twitter on a blog post said “Phone-number based 2FA be used - and abused - by...

February 23rd, 2023

Continue Reading

Pepsi Bottling Ventures suffers data breach

Pepsi Bottling Ventures suffers data breach

The largest privately owned bottler of Pepsi-Cola products in the United States, Pepsi Bottling Ventures,...

February 16th, 2023

Continue Reading

New Russian info-stealer attacks target Ukraine.

New Russian info-stealer attacks target Ukraine.

Security experts have seen a Russian hacking organization, which was responsible for the catastrophic...

February 9th, 2023

Continue Reading

Users of GitHub Desktop and Atom must take action

Users of GitHub Desktop and Atom must take action

Unidentified attackers reportedly gained access to certain of GitHub's development and release planning...

February 2nd, 2023

Continue Reading

€5.5 million fined on WhatsApp

€5.5 million fined on WhatsApp

Meta's WhatsApp has been fined by Irish Data Protection Commission (DPC) for violating the General Data...

January 24th, 2023

Continue Reading

$5.4 million fined on TikTok

$5.4 million fined on TikTok

TikTok UK and TikTok Ireland have been fined €5,000,000 (Around $5.4 Million) by France's data protection...

January 17th, 2023

Continue Reading

Microsoft January 2023 Patch Tuesday

Microsoft January 2023 Patch Tuesday

On 11th January 2023 was the January Patch Tuesday, and a zero-day vulnerability and 98 flaws were fixed. ...

January 12th, 2023

Continue Reading

Google to Resolve User Location Tracking Lawsuits

Google to Resolve User Location Tracking Lawsuits

In order to resolve two lawsuits launched by Indiana and Washington, D.C. about its "deceptive" location...

January 3rd, 2023

Continue Reading

LastPass admits on password vaults been stolen

LastPass admits on password vaults been stolen

On 22nd December 2022 LastPass revealed that after entering its cloud storage earlier this year using...

December 27th, 2022

Continue Reading

Client-side encryption for Gmail for workspace

Client-side encryption for Gmail for workspace

Google recently revealed that it is extending customer access to client-side encryption in Gmail online....

December 20th, 2022

Continue Reading

Multiple Chrome extensions uses Browser Hijackers

Multiple Chrome extensions uses Browser Hijackers

Around two million users were found to have been infected by browser hijackers employing malicious Chrome...

December 8th, 2022

Continue Reading

Phishing Campaign Targets Black Friday Season

Phishing Campaign Targets Black Friday Season

A continuous spear-phishing attack that takes advantage of Black Friday and Cyber Monday has been detected...

December 1st, 2022

Continue Reading

Twitter verified account targeted in Phishing Campaigns

Twitter verified account targeted in Phishing Campaigns

Twitter is now charging $8 a month for Twitter Blue and account verification. With this many phishing...

November 22nd, 2022

Continue Reading

800,000 Malaysian Voters Compromised

800,000 Malaysian Voters Compromised

The news organization New Straits Times announced on November 11, 2022, that there had allegedly been...

November 17th, 2022

Continue Reading

Daixin Team the ransomware and data extortion group Targets Healthcare Sector

Daixin Team the ransomware and data extortion group Targets Healthcare Sector

The US Federal Bureau of Investigation, the Cybersecurity and Infrastructure Security Agency, and the...

November 10th, 2022

Continue Reading

Microsoft Storage Location Expose Customers’ Information

Microsoft Storage Location Expose Customers’ Information

One of Microsoft clients' critical data was exposed due to a storage server configuration error, according...

November 1st, 2022

Continue Reading

Throughout Europe, Russian spoofing campaigns are disseminating false information on Ukraine

Throughout Europe, Russian spoofing campaigns are disseminating false information on Ukraine

A significant amount of social media posts and accounts that were spoofing Russian information was taken...

October 25th, 2022

Continue Reading

Malware for Windows SideWalk adapted for Linux

Malware for Windows SideWalk adapted for Linux

It was discovered that a Linux version of the SideWalk backdoor had been developed, allegedly by the...

October 6th, 2022

Continue Reading

Queen Elizabeth II’s death used in credential harvesting

Queen Elizabeth II’s death used in credential harvesting

Proofpoint’s Threat Insight Team reveled on 14th September 2022 that threat actors are employing phishing...

September 28th, 2022

Continue Reading

Starbucks Suffers Data Breach

Starbucks Suffers Data Breach

The Straits Times published an article on a data breach involving a US coffee shop company Starbucks...

September 23rd, 2022

Continue Reading

Ransomware Rise – All you need to know

Ransomware Rise – All you need to know

What is Ransomware? Ransomware is a form of malware made to prevent users or organizations from accessing...

September 16th, 2022

Continue Reading

Uber internal system breached

Uber internal system breached

Following news that a hacker had gained access to Uber's network and forced it to shut down various internal...

September 16th, 2022

Continue Reading

Customer email addresses of DigitalOcean were compromised by a recent MailChimp breach

Customer email addresses of DigitalOcean were compromised by a recent MailChimp breach

A security advisory about a hack on its email service provider MailChimp that had an impact on its clients...

September 14th, 2022

Continue Reading

SharkBot Malware Returned to Google Play Store

SharkBot Malware Returned to Google Play Store

SharkBot malware has returned in a fresh and upgraded edition, according to a post published by security...

September 7th, 2022

Continue Reading

Last Pass Source Code Exposed in Data Breach

Last Pass Source Code Exposed in Data Breach

On 25th August 2022, Last pass company published a data breach notification affirming that threat actors...

August 31st, 2022

Continue Reading

VLC Media Player website banned in India

VLC Media Player website banned in India

VLC Media Player one of India’s most popular media players has being banned in the country. User can’t...

August 25th, 2022

Continue Reading

Cisco Confirms Breached By Ransomware Group

Cisco Confirms Breached By Ransomware Group

Cisco has confirmed that the Yanluowang ransomware group was hacked their data. This happens when the...

August 12th, 2022

Continue Reading

Twitter confirms that a data breach has affected millions of accounts

Twitter confirms that a data breach has affected millions of accounts

On 5th August 2022, Twitter released a security advisory saying, "In January 2022, we received a report...

August 8th, 2022

Continue Reading

New Android Apps in the Play Store Contain Malware

New Android Apps in the Play Store Contain Malware

In the recent, write up by Dr.Web on virus activity on mobile devices he mentioned that he has discovered...

July 28th, 2022

Continue Reading

Is Microsoft Teams down?

Is Microsoft Teams down?

On July 21st on the official Microsoft twitter account for update on certain service incidents said that...

July 21st, 2022

Continue Reading

Harvest Credentials on Fraudulent Facebook Pages

Harvest Credentials on Fraudulent Facebook Pages

Computer Emergency Response Team of Ukraine (CERT-UA) has released an article reporting that number of...

July 20th, 2022

Continue Reading

$8.1 million stole in Uniwasp phishing attack

$8.1 million stole in Uniwasp phishing attack

Uniswap a decentralized cryptocurrency exchange has loss millions of dollars in a phishing attack. On...

July 19th, 2022

Continue Reading

Twitter and YouTube Accounts of British Military Hacked by threat actors

Twitter and YouTube Accounts of British Military Hacked by threat actors

On 4th July 2022, the Britain’s Ministry of Defense tweeted “The breach of the Army’s Twitter and...

July 14th, 2022

Continue Reading

Threat actors are still Exploiting Log4Shell vulnerability

Threat actors are still Exploiting Log4Shell vulnerability

Cybersecurity & Infrastructure Security Agency (CISA) and the United States Coast Guard Cyber Command...

July 7th, 2022

Continue Reading

U.S. FCC commissioner has requests google and Apple to take off TikTok from app stores

U.S. FCC commissioner has requests google and Apple to take off TikTok from app stores

On 24th June 2022, Brendan Carr the Federal Communication Commission Commissioner has sent a letter to...

July 1st, 2022

Continue Reading

Top 25 Most Dangerous Software Weaknesses – 2022 CWE

Top 25 Most Dangerous Software Weaknesses – 2022 CWE

On June 28th 2022, Mitre shared the 2022 Common Weakness Enumeration (CWE™) Top 25 Most Dangerous Software...

June 29th, 2022

Continue Reading

Email bug lets attackers bypass Security

Email bug lets attackers bypass Security

As notified by Cisco of the security flaw (tracked as CVE-2022-20798) was found in the external authentication...

June 16th, 2022

Continue Reading

Symbiote Malware infects all running processes on Linux Systems

Symbiote Malware infects all running processes on Linux Systems

A newly found malware known as Symbiote infects all running processes on compromised systems, steals...

June 10th, 2022

Continue Reading

RCE Vulnerability shambles Google Chrome Dev Channel

RCE Vulnerability shambles Google Chrome Dev Channel

It has been reported that a recently patched severe remote code execution vulnerability flaw in the V8...

June 2nd, 2022

Continue Reading

Zoom flaw enables users get hacked just by sending a Message

Zoom flaw enables users get hacked just by sending a Message

Our everyday video conferencing service Zoom was able to resolve as many as 4 security vulnerabilities,...

May 31st, 2022

Continue Reading

If you interact, you get caught: A Chatbot phishing campaign

If you interact, you get caught: A Chatbot phishing campaign

Phishing campaigns are usually executed on emails, whatever links included are commonly delivered through...

May 25th, 2022

Continue Reading

21 Year old jailed for stealing Cryptocurrency by luring victims on Snapchat

21 Year old jailed for stealing Cryptocurrency by luring victims on Snapchat

Online crypto scams and fraudulent schemes are hardly anything new. However, this specific case of a...

May 16th, 2022

Continue Reading

Lincoln College suffers Ransomware attack

Lincoln College suffers Ransomware attack

Lincoln College is to shut down after 157 years due to ransomware attack? Lincoln College is situated...

May 11th, 2022

Continue Reading

WhatsApp is DOWN

WhatsApp is DOWN

According to many user reports, it seems that WhatsApp is experiencing outages. Reports state that the...

April 29th, 2022

Continue Reading

Quantum ransomware Strikes

Quantum ransomware Strikes

The Quantum ransomware, 1st discovered in August of 2021 was seen spreading fast attacks that escalate...

April 26th, 2022

Continue Reading

Password stealing malware for Sale

Password stealing malware for Sale

A new malware named BlackGuard is now available on Hacker forums! Now available for sale on numerous...

April 1st, 2022

Continue Reading

Honda Bug gives access to your Vehicles

Honda Bug gives access to your Vehicles

Can hackers access your vehicle? Selected Honda and Acura car models have been affected with a recent...

March 28th, 2022

Continue Reading

A huge hit on OKTA

A huge hit on OKTA

Many organizations that rely on Okta may have been collateral damage due to the big cyber hit on the...

March 25th, 2022

Continue Reading

Can anyone create a Fake Chrome Browser Windows?

Can anyone create a Fake Chrome Browser Windows?

A phishing kit and campaign has been released that allows red teamers and 'wannabe' cybercriminals to...

March 21st, 2022

Continue Reading

Ubisoft states that a “security” incident resets Staff Passwords

Ubisoft states that a “security” incident resets Staff Passwords

Ubisoft, the well known video game developer confirms that they suffered a "cyber security incident"...

March 15th, 2022

Continue Reading

How dangerous is Emotet?

How dangerous is Emotet?

Introduction Emotet is widely considered one of the world’s most dangerous global malware families...

March 10th, 2022

Continue Reading

SharkBot malware plays ‘hide and seek’ as an Android antivirus in Google Play Store

SharkBot malware plays ‘hide and seek’ as an Android antivirus in Google Play Store

  SharkBot banking malware has infiltrated the Google Play Store, the official Android app...

March 6th, 2022

Continue Reading

‘Electron Bot’ infiltrates Microsoft Store via clones of Popular Games

‘Electron Bot’ infiltrates Microsoft Store via clones of Popular Games

Our Favorite Games are turning in to Malwares?  As unfortunate as it sounds, a malware named Electron...

February 25th, 2022

Continue Reading

TikTok and YouTube shares ‘Your’ Data more than any other App, Take a look at how.

TikTok and YouTube shares ‘Your’ Data more than any other App, Take a look at how.

TikTok is sharing User Data more than other Social Media Platform, Study Claims. As we all know, one...

February 14th, 2022

Continue Reading

Apps on your phone, They know a lot

Apps on your phone, They know a lot

Your mobile phone is accessing lot of data of yours? Are you safe? The average smartphone user these...

November 9th, 2021

Continue Reading

Security Operations Centre (SOC) Expectation Vs Reality

Security Operations Centre (SOC) Expectation Vs Reality

Security Operations Centre (SOC) is becoming a hot topic in the market and everyone expects to fight...

October 11th, 2021

Continue Reading

How Did Facebook Disappear from the Internet?

How Did Facebook Disappear from the Internet?

On 4th October Facebook and its affiliated services WhatsApp and Instagram was reported to be missing...

October 7th, 2021

Continue Reading

How being open can make you safer

How being open can make you safer

Security by Obscurity is making you Vulnerable. Here's the loopholes of it and real-world examples of...

August 25th, 2021

Continue Reading

5 key Considerations for Cyber Security Success

5 key Considerations for Cyber Security Success

What is the key to Cyber Security Success. It's simple. Cyber security investments are becoming one...

August 25th, 2021

Continue Reading

How to protect your personal data

How to protect your personal data

If your data is stolen there's no point of it being secure. Insights to General Data Protection Regulation...

August 25th, 2021

Continue Reading

3 Biggest Cybersecurity Lies

3 Biggest Cybersecurity Lies

It's is time for business leaders to see cyberthreats for what they are—enterprise risk management...

August 25th, 2021

Continue Reading

5 Key Points in selecting your Security Vendor

5 Key Points in selecting your Security Vendor

Technical and infrastructure readiness is important for all organisations in terms of Cyber. How can...

August 25th, 2021

Continue Reading

Are you Ready for General Data Protection Regulation (GDPR)?

Are you Ready for General Data Protection Regulation (GDPR)?

It's the most advanced and people centric cyber security regulation released so far. Here's how your...

August 25th, 2021

Continue Reading

3 Reasons why Cyber Security is Complex

3 Reasons why Cyber Security is Complex

A lot of organization try to apply find it complex to solve cybersecurity issues. Here's why. With...

August 25th, 2021

Continue Reading