In this episode of The Cyber Express Podcast, Augustin Kurian, Editor-in-Chief of The Cyber Express, sits down with Zahid Altaf,…
The US has granted tariff exclusions for smartphones, computers and other electronics imports supplied largely by China, sparing them from…
I just came across a really interesting concept, which I’ll call “Living by Umesh”, or, being “Umeshian”–in honor of the…
Hackers allegedly claim that a software company based in India was compromised on December 19, 2024, by a hacker identified…
In an era where instant messaging apps like WhatsApp, Telegram, Signal, iMessage, Viber, and WeChat dominate personal and professional communication,…
Cessnock City Council has created a chief information officer role to lead the council’s information technology strategy. In the job…
South African telecom provider Cell C disclosed a data breach following a cyberattack Pierluigi Paganini April 14, 2025 Cell C,…
The code below does the following: Read a list of IPs Send each line (IP) to the ipinfodb web service…
Tirreno is an open-source fraud prevention platform designed as a universal analytics tool to monitor online platforms, web applications, SaaS…
Prospa, an online lender for small business, has used hackathons and graph database technology to map out complex relationships between…
This is an interesting post about how the concept of PageRank for URLs is becoming dated at best, and obsolete…
In recent years, we’ve witnessed a range of cyberattacks targeting critical infrastructure and both public and private sector entities. These…











