A recent surge in login attempts targeting Palo Alto Networks’ PAN-OS GlobalProtect portals mainly located in the U.S. could be…
There’s a clear gap between expectation and reality when it comes to security controls. Despite deploying best-in-class security tools and…
Cybersecurity researchers have identified a growing trend in phishing attacks leveraging QR codes, a tactic known as “quishing.” These attacks…
Google Calendar is a widely used tool for scheduling online events, meetings, and sending reminders. However, a concerning new trend…
If you’re a geek like me (which you might be if you’re reading this), you’ve maybe heard the buzz about…
ChatGPT isn’t working for millions of users worldwide. While it’s able to respond to the first message in a conversation,…
The cybersecurity landscape has witnessed a concerning development with the emergence of “Prince Ransomware,” an open-source ransomware builder that was…
A recent investigation by ESET researchers has shed light on the continued activities and evolving toolset of the China-aligned Advanced…
U.S. CISA adds Apache Tomcat flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini April 02, 2025 U.S. Cybersecurity and…
I have an obsession with reading. Well, actually, as it stands now, it’s more of an obsession with being able…
Kidflix, one of the largest platforms used to host, share, and stream child sexual abuse material (CSAM) on the dark web,…
French antitrust regulators have imposed a hefty fine of €150 million ($162.4 million) on tech giant Apple for abusing its…











