Meta Uncovers Massive Social Media Cyber Espionage Operations Across South Asia
Three different threat actors leveraged hundreds of elaborate fictitious personas on Facebook and Instagram to target individuals located in South...
Read more →Three different threat actors leveraged hundreds of elaborate fictitious personas on Facebook and Instagram to target individuals located in South...
Read more →IT and cybersecurity teams are so inundated with security notifications and alerts within their own systems, it’s difficult to monitor...
Read more →May 04, 2023Ravie LakshmananOnline Security / ChatGPT Meta said it took steps to take down more than 1,000 malicious URLs...
Read more →May 03, 2023Ravie LakshmananCyber Espionage / Malware A Chinese state-sponsored hacking outfit has resurfaced with a new campaign targeting government,...
Read more →May 03, 2023Ravie LakshmananPassword Security / Authentication Almost five months after Google added support for passkeys to its Chrome browser,...
Read more →May 03, 2023Ravie LakshmananDark Web / Cyber Crime An international law enforcement operation has resulted in the arrest of 288...
Read more →May 03, 2023The Hacker NewsCISO / Cybersecurity Almost half of MSP clients fell victim to a cyberattack within the last...
Read more →May 03, 2023Ravie LakshmananPrivacy / Technology Apple and Google have teamed up to work on a draft industry-wide specification that’s...
Read more →May 03, 2023Ravie LakshmananSurveillance / Vulnerability Threat actors are actively exploiting an unpatched five-year-old flaw impacting TBK digital video recording...
Read more →May 03, 2023Ravie LakshmananICS/SCADA Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday released an Industrial Control Systems...
Read more →May 02, 2023Ravie LakshmananNetwork Security / Vulnerability Cybersecurity researchers have uncovered weaknesses in a software implementation of the Border Gateway...
Read more →The telecom industry has always been a tantalizing target for cybercriminals. The combination of interconnected networks, customer data, and sensitive...
Read more →