INTERPOL busts scam networks across Africa, seizes millions
Red Card 2.0: INTERPOL busts scam networks across Africa, seizes millions Pierluigi Paganini February 20, 2026 INTERPOL’s Operation Red Card 2.0 led to 651 arrests…
Red Card 2.0: INTERPOL busts scam networks across Africa, seizes millions Pierluigi Paganini February 20, 2026 INTERPOL’s Operation Red Card 2.0 led to 651 arrests…
A critical vulnerability in BeyondTrust’s remote support software is being actively exploited by hackers to deliver dangerous backdoors on compromised systems. The flaw, tracked as…
Operation Red Card 2.0, supported by INTERPOL and involving law enforcement agencies from 16 African countries, led to 651 arrests and the recovery of more…
Like any other marketplace, the social commerce platform has its share of red flags. It pays to know what to look for so you can…
Hackers Using OAuth Apps in Microsoft Entra ID Hackers are increasingly abusing OAuth applications in Microsoft Entra ID to gain persistent access, blending in as normal “business…
Google has rushed out a vital security patch for Chrome, fixing three flaws that could let attackers run malicious code on users’ devices. The Stable…
Here’s a look at the most interesting products from the past week, featuring releases from Compliance Scorecard, Impart Security, Redpanda, and Virtana. Impart enables safe,…
PentAGI Penetration Testing Tool PentAGI introduces an AI-driven approach to penetration testing, automating complex workflows with tools like Nmap and Metasploit while generating detailed reports.…
Hackers are actively exploiting a critical vulnerability in BeyondTrust’s remote support software to deploy the VShell backdoor and SparkRAT remote access trojan, enabling full compromise…
In this Help Net Security interview, Paul Suarez, VP and CISO at Casey’s, explains how his team manages patching and upgrades for fuel payment systems…
Google Issues Emergency Chrome Security Update A significant security update for the Chrome Stable Channel to address multiple vulnerabilities, including high-severity flaws affecting the browser’s…
A new phishing campaign exploiting Microsoft’s OAuth 2.0 Device Authorization Grant flow to gain unauthorized and persistent access to Microsoft 365 accounts. The sophisticated attack…