Check Point Software confirms security incident but pushes back on threat actor claims
02
Apr
2025

Check Point Software confirms security incident but pushes back on threat actor claims

Check Point Software confirmed it was targeted in a recent hacking attempt after a threat actor offered to sell sensitive…

Royal Mail
02
Apr
2025

Royal Mail investigates data leak claims, no impact on operations

​Royal Mail is investigating claims of a security breach after a threat actor leaked over 144GB of data allegedly stolen…

North Korea IT Workers Expand Their Employment Across Europe To Infiltrate the Company Networks
02
Apr
2025

North Korea IT Workers Expand Their Employment Across Europe To Infiltrate the Company Networks

North Korean IT workers have intensified their global operations, expanding their employment footprint across Europe to infiltrate corporate networks and…

DragonForce Takes Over RansomHub
02
Apr
2025

DragonForce Claims To Be Taking Over RansomHub

The DragonForce ransomware group claims to be taking over the infrastructure of RansomHub, the biggest ransomware group in the last…

Addicted To Better | Daniel Miessler
02
Apr
2025

Addicted To Better | Daniel Miessler

If you’re like me (which you likely are since you’re reading this), you’re probably obsessed with GTD, Lifehacker, 43 Folders,…

Mass login scans of PAN GlobalProtect portals surge
02
Apr
2025

Mass login scans of PAN GlobalProtect portals surge

A recent surge in login attempts targeting Palo Alto Networks’ PAN-OS GlobalProtect portals mainly located in the U.S. could be…

OnDefend header
02
Apr
2025

The Reality Behind Security Control Failures—And How to Prevent Them

There’s a clear gap between expectation and reality when it comes to security controls. Despite deploying best-in-class security tools and…

QR code phishing (Quishing) Attack Your Smartphones To Steal Microsoft Accounts Credentials
02
Apr
2025

QR code phishing (Quishing) Attack Your Smartphones To Steal Microsoft Accounts Credentials

Cybersecurity researchers have identified a growing trend in phishing attacks leveraging QR codes, a tactic known as “quishing.” These attacks…

Naveen Goud
02
Apr
2025

Google Calendar leading to Phishing Scams and Data Thefts

Google Calendar is a widely used tool for scheduling online events, meetings, and sending reminders. However, a concerning new trend…

AJAX : What’s All The Commotion?
02
Apr
2025

AJAX : What’s All The Commotion?

If you’re a geek like me (which you might be if you’re reading this), you’ve maybe heard the buzz about…

ChatGPT
02
Apr
2025

ChatGPT is down worldwide with something went wrong error

ChatGPT isn’t working for millions of users worldwide. While it’s able to respond to the first message in a conversation,…

Prince Ransomware - An Automated Open-Source Ransomware Builder Freely Available on GitHub
02
Apr
2025

Prince Ransomware – An Automated Open-Source Ransomware Builder Freely Available on GitHub

The cybersecurity landscape has witnessed a concerning development with the emergence of “Prince Ransomware,” an open-source ransomware builder that was…