The Rise in Phishing Scams
As cybersecurity platforms have become more effective, cyber attackers have shifted their strategy. Rather than challenging defense applications to identify weaknesses, they are now increasingly…
As cybersecurity platforms have become more effective, cyber attackers have shifted their strategy. Rather than challenging defense applications to identify weaknesses, they are now increasingly…
A well-coordinated cyber intrusion, spanning 11 days, culminated in the deployment of LockBit ransomware across a corporate environment. The attack, which began with the execution…
GamaCopy targets Russia mimicking Russia-linked Gamaredon APT Pierluigi Paganini January 27, 2025 New threat actor GamaCopy mimics Russia-linked Gamaredon APT in attacks on Russian-speaking targets.…
Google has rolled out a new Stable Channel Update for its Chrome browser, addressing critical security vulnerabilities that posed significant risks to users. The update,…
A recent cybersecurity attack involving a Trojanized version of the XWorm Remote Access Trojan (RAT) builder has compromised over 18,000 devices worldwide. This sophisticated malware,…
Broadcom’s 2023 acquisition of VMware for US$69bn led to disruptive changes in the virtualisation provider’s pricing. Key here is a move from perpetual licences to…
A 59-year-old man from Union City, New Jersey, has been arrested and charged in connection with a large-scale scheme to defraud an elderly woman out…
Typically, Yahoo Boy scammers message hundreds of people online while posing as members of the opposite sex using pictures stolen from social media profiles. They…
Burp Suite 2025.1, is packed with new features and enhancements designed to improve your web application testing workflow. This latest version brings exciting upgrades like…
Critical security flaw in SonicWall SMA 1000 appliances (CVE-2025-23006) exploited as a zero-day. Rated CVSS 9.8, patch immediately to protect systems. SonicWall has identified a…
ESXi ransomware attacks use SSH tunnels to avoid detection Pierluigi Paganini January 27, 2025 Threat actors behind ESXi ransomware attacks target virtualized environments using SSH…
In this interview, we explore Harley’s experience at DEFCON, the world’s largest hacker convention, where he took his skills to new heights. His story goes…