The holiday season is a time for joy, celebration, and giving. But unfortunately, it’s also the favorite season for scammers,…
A critical remote code execution vulnerability in Apple Safari, identified as CVE-2024-44308, has been discovered and actively exploited in the…
Researchers uncovered the resurgence of APT-C-01, also known as the Poison Ivy group, an advanced persistent threat organization notorious for…
How threat actors can use generative artificial intelligence? Pierluigi Paganini December 02, 2024 Generative Artificial Intelligence (GAI) is rapidly revolutionizing…
Telstra is to acquire mobile virtual network operator Boost Mobile, expanding its existing operational management of the company. Boost Mobile…
Despite advancements in cybersecurity tools, human vulnerability remains the weakest link, with phishing among the most dangerous forms of social…
Welcome to this week’s Cybersecurity Newsletter, where we delve into the latest advancements and critical updates in the cybersecurity landscape….
Several high-profile and global law firms have been under the radar of cyber-security data breaches. For instance, the Mossack Fonseca…
Cybersecurity researchers have identified a concerning link between the advanced phishing toolkit known as ‘Rockstar 2FA’ and a surge in…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Researchers reveal exploitable flaws in…
Russian authorities have arrested Mikhail Matveev, a notorious Russian hacker linked to multiple ransomware attacks worldwide. Matveev, who was also…
Microsoft has announced plans to deprecate the “Bring Your Own License” (BYOL) feature in Microsoft Defender for Cloud as part…











