Sextortion scams now use your “cheating” spouse’s name as a lure
A new variant of the ongoing sextortion email scams is now targeting spouses, saying that their husband or wife is...
Read more →A new variant of the ongoing sextortion email scams is now targeting spouses, saying that their husband or wife is...
Read more →Tropic Trooper (aka KeyBoy, Pirate Panda, and APT23) is a sophisticated cyberespionage APT group, and it has been active since...
Read more →Crashes due to faulty updates are nothing new; in fact, one reason IT teams often delay updates is their unreliability...
Read more →From zero-day exploits to polymorphic malware, today’s organizations must protect themselves against increasingly sophisticated cyber threats. But while these types of complex attack vectors...
Read more →Recent research indicates that the Predator spyware, once thought to be inactive due to US sanctions, has resurfaced with enhanced...
Read more →IT leaders plan to spend more in 2025 compared to 2024, the Budget planning guides from analyst Forrester has reported....
Read more →New attacks attributed to China-based cyber espionage group Mustang Panda show that the threat actor switched to new strategies and...
Read more →WhatsApp’s “View Once” feature, designed to enhance privacy by allowing users to send photos and videos that disappear after being...
Read more →Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions and judicial-related matters. By leveraging trust...
Read more →Finding and acquiring the right data to build an enterprise dataset is perhaps the most critical task facing organisations that...
Read more →In July 2024, researchers discovered a previously unknown backdoor, which they have dubbed Loki. After a thorough analysis of the...
Read more →Germany’s domestic intelligence agency has warned against a cyber group belonging to Russian military intelligence (GRU) Unit 29155, saying it...
Read more →