Scammers Exploit JFK Files Release with Malware and Phishing
Veriti Research reported a developing cyber threat campaign centred around the declassification and release of the RFK, MLK and JFK...
Read more →Veriti Research reported a developing cyber threat campaign centred around the declassification and release of the RFK, MLK and JFK...
Read more →Russian GRU-linked hackers exploit known software flaws to breach critical networks worldwide, targeting the United States and the United Kingdom,...
Read more →Doxbin Data Breach: Hackers leak 136,000+ user records, emails, and a ‘blacklist’ file, exposing those who paid to keep their...
Read more →New Astaroth Phishing Kit bypasses 2FA (two-factor authentication) to steal Gmail, Yahoo and Microsoft login credentials using a reverse proxy,...
Read more →Super-admin access vulnerability discovered in FortiOS Security Fabric. Exploitation could lead to widespread network breaches. Update now. Fortinet has released a...
Read more →As digital inclusion gains prominence, businesses face increasing pressure to ensure their websites are accessible to users of all abilities....
Read more →Massive 1.17 TB data leak exposes billions of records from a Chinese IoT grow light company. Wi-Fi passwords, IP addresses,...
Read more →Cybersecurity is a must as online threats rise. Businesses must train employees, back up data, and adopt strong security practices...
Read more →Microsoft’s February Patch Tuesday addresses 63 security vulnerabilities, including two actively exploited zero-days. Update your systems now to protect against...
Read more →Apple fixes the USB Restricted Mode flaw in iOS 18.3.1 and iPadOS 18.3.1. Vulnerability exploited in targeted attacks. Update your...
Read more →Privacy, security, and unrestricted access are the promises of a personal VPN. But what does it actually do, and why...
Read more →Monero (XMR) remains the leading privacy cryptocurrency with its unparalleled anonymity and security in a world increasingly financially surveilled. As...
Read more →