Beware of Ramadan & Eid Fitr Online Scams Steal Financial Data
As the holy month of Ramadan approaches, bringing a surge in online shopping and charitable giving, cybercriminals are ramping up their efforts to exploit the…
As the holy month of Ramadan approaches, bringing a surge in online shopping and charitable giving, cybercriminals are ramping up their efforts to exploit the…
Entering the dynamic world of cryptocurrencies is pretty exciting. But one can easily get overwhelmed with the amount of information that floods you once you…
IT providers might have enough on their plates with environmental, social and governance (ESG) requirements, but experts say adding biodiversity to the mix can help…
StrelaStealer targeted over 100 organizations across the EU and US Pierluigi Paganini March 25, 2024 Researchers reported that over 100 organizations in Europe and US…
A new security shortcoming discovered in Apple M-series chips could be exploited to extract secret keys used during cryptographic operations. Dubbed GoFetch, the vulnerability relates…
Mar 25, 2024NewsroomCyber Espionage / Email Security The Iran-affiliated threat actor tracked as MuddyWater (aka Mango Sandstorm or TA450) has been linked to a new…
GoFetch side-channel attack against Apple systems allows secret keys extraction Pierluigi Paganini March 25, 2024 Researchers demonstrated a new side-channel attack, named GoFetch, against Apple…
Security researcher Henry N. Caga has identified a significant cross-site scripting (XSS) vulnerability within a Google sub-domain that allows hackers to perform various attacks, including…
The notorious hacking group R00Tk1t has shifted its focus from Malaysian organizations toward India, marking a concerning development in the threat actor plans. The threat…
The Mobile Security Framework (MobSF), a widely used pen-testing, malware analysis, and security assessment framework, has been found to contain a critical input validation flaw…
Hackers have claimed unauthorized access to Fortinet devices across various companies. This breach highlights cybercriminals’ persistent threat to corporate security infrastructures and the importance of…
Among Gartner’s top predictions are the collapse of the cybersecurity skills gap and the reduction of employee-driven cybersecurity incidents through the adoption of generative AI…