Nigerian Man Sentenced to 8 Years in US Prison for $8 Million BEC Scheme
A Nigerian national who had been living in the United Arab Emirates has been sentenced to more than eight years in a US prison for…
A Nigerian national who had been living in the United Arab Emirates has been sentenced to more than eight years in a US prison for…
Today, the Specops Software research team revealed the results of their latest findings on the use of keyboard walk patterns in compromised passwords. The top…
Jul 18, 2023THNMalware / Cyber Attack An unidentified threat actor compromised an application used by multiple entities in Pakistan to deliver ShadowPad, a successor to…
A threat actor infected their own computer with an information stealer, which has allowed Israeli threat intelligence company Hudson Rock to uncover their real identity.…
A critical design flaw in the Google Cloud Build service discovered by cloud security firm Orca Security can let attackers escalate privileges, providing them with…
The Football Association (FA) has enlisted the help of its long-standing IT partner Google Cloud to create digital tools that will collect the player performance…
A financially motivated cybercrime gang has been observed deploying BlackCat ransomware payloads on networks backdoored using a revamped Sardonic malware version. Tracked as FIN8 (aka…
A 28 years old Former IT security analyst of an Oxford-based company has been sentenced to three years for deceiving the company to extort money.…
A user on a hacker forum claimed to have access to the internal software of the US’s prominent children’s family entertainment chain Chuck E. Cheese.…
Threat actors have started hacking WordPress websites by exploiting a critical vulnerability in the WooCommerce Payments plugin. A fully integrated payment solution developed by Automattic,…
The Cybersecurity & Infrastructure Security Agency (CISA) has released a list of free tools for organizations to secure themselves in cloud environments. The post from…
One of the biggest challenges faced by regulated and non-regulated companies is assessing whether or not another business is safe to work with. Existing approaches…