New Zealand Cyber Incidents Surge 58%
New Zealand’s National Cyber Security Centre (NCSC) has released its highly anticipated Cyber Security Insights Report for the third quarter of 2024. This report reveals…
New Zealand’s National Cyber Security Centre (NCSC) has released its highly anticipated Cyber Security Insights Report for the third quarter of 2024. This report reveals…
Researchers discovered a new variant of the AntiDot banking trojan targeting Android mobile devices through a mobile-phishing (mishing) campaign, where this variant builds upon the…
Operation PowerOFF took down 27 DDoS platforms across 15 countries Pierluigi Paganini December 12, 2024 Operation PowerOFF took down 27 DDoS stresser services globally, disrupting…
The ongoing prevalence (and rise) of software supply chain attacks is enough to keep any software developer or security analyst up at night. The recent…
SUMMARY: Researchers found a rise in phishing attacks in the UAE impersonating Dubai Police via SMS. Attackers use fake domains with typosquatting and suspicious extensions…
Dec 12, 2024Ravie LakshmananVulnerability / Device Security Details have emerged about a now-patched security vulnerability in Apple’s iOS and macOS that, if successfully exploited, could…
Krispy Kreme disclosed a cyberattack impacting its operations, most notably disrupting online ordering services in parts of the United States. The Krispy Kreme cyberattack was…
Security researchers have uncovered Nova, a sophisticated evolution of the Snake Keylogger malware family, demonstrating advanced data stealing capabilities and improved evasion techniques. This new…
A stealthy Command-and-Control (C2) infrastructure Red Team tool named ConvoC2 showcases how cyber attackers can exploit Microsoft Teams to execute system commands on compromised hosts…
A newly discovered vulnerability in Facebook Messenger for iOS has revealed a critical flaw that could disrupt group calls by exploiting emoji reactions. This denial-of-service…
Cybersecurity researchers have uncovered a sophisticated exploitation campaign involving a zero-day (0-day) vulnerability in Cleo file transfer software platforms. This campaign has been used to…
For years, there’s been a widely held belief that iOS devices—such as iPhones—are virtually immune to phishing attacks, largely due to Apple’s strong emphasis on…