FBI Busts $100M Romance Scam, Ghana Men Face U.S. Charges
The U.S. authorities have secured the extradition of three Ghanaian nationals accused of running a fraud operation that stole over $100 million from victims through…
The U.S. authorities have secured the extradition of three Ghanaian nationals accused of running a fraud operation that stole over $100 million from victims through…
NBN Co is embedding AI and automation “into the fabric of [its] operations”, with tools already live for design, support and knowledge access, and spending…
A sophisticated new attack campaign has emerged targeting Israeli businesses and infrastructure sectors through a deceptive social engineering technique known as “ClickFix,” which tricks users…
A critical security vulnerability has been discovered in Apache bRPC that allows attackers to remotely crash services through network-based denial of service attacks. The vulnerability,…
EntraGoat is a purpose-built tool that sets up a vulnerable Microsoft Entra ID environment to mimic real-world identity security issues. It’s designed to help security…
Attackers can create persistent malware that hides below a computer’s operating system, making it effectively invisible to endpoint detection and response tools, new security research…
The Dutch National Cyber Security Centre (NCSC-NL) has issued an urgent warning about sophisticated cyberattacks targeting critical infrastructure through a zero-day vulnerability in Citrix NetScaler…
DNS is once again in the crosshairs of threat actors. According to the 2025 DNS Threat Landscape Report by Infoblox, attackers are changing tactics, and…
Dutch security researchers have disclosed a fresh batch of critical vulnerabilities in TETRA (Terrestrial Trunked Radio) networks, including flaws that undermine its end-to-end encryption (E2EE)…
Four Ghanaian nationals orchestrating an international cybercrime operation that defrauded victims of over $100 million through sophisticated romance scams and business email compromise attacks have…
Dutch security researchers have disclosed a fresh batch of critical vulnerabilities in TETRA (Terrestrial Trunked Radio) networks, including flaws that undermine its end-to-end encryption (E2EE)…
A significant vulnerability in multi-user Linux environments, where standard system behaviors can be exploited to harvest sensitive credentials and secrets from other users. The research,…