Hackers use the Greatness PaaS tool to Steal Microsoft 365 login credentials
27
May
2024

Hackers use Greatness PaaS tool to Steal Microsoft 365 credential

A new Phishing-as-a-Service (PaaS) tool called Greatness is being used by cybercriminals to steal Microsoft 365 login credentials. First detected…

Sav-Rx
27
May
2024

Sav-Rx discloses data breach impacting 2.8 million Americans

Prescription management company Sav-Rx is warning over 2.8 million people in the United States that it suffered a data breach,…

GNOME Remote Desktop Flaw Let Attackers Read Login Credentials
27
May
2024

GNOME Remote Desktop Flaw Let Attackers Read Login Credentials

GNOME desktop manager was equipped with a new feature which allowed remote users to create graphical sessions on the system…

Beyond Code: Harnessing AI for Advanced Cybersecurity Solutions
27
May
2024

Beyond Code: Harnessing AI for Advanced Cybersecurity Solutions

By Angel Vossough, Co-Founder & CEO of BetterAI.io Cybersecurity defenses are shifting, aiming to predict and block cyber threats in…

Essential Features of Cybersecurity Management Software for MSPs
27
May
2024

Essential Features of Cybersecurity Management Software for MSPs

Protect your clients’ businesses from cyber threats with Cybersecurity Management Software. Explore the unified control panel, real-time threat detection, and…

Pakistan Islamabad's Safe City Authority Online System
27
May
2024

Islamabad’s Safe City Authority Systems Down After Hack

Islamabad’s Safe City Authority experienced a significant disruption when its online system was breached by hackers, prompting an immediate shutdown….

Impact of Remote Work and Cloud Migrations on Security Perimeters
27
May
2024

Impact of Remote Work and Cloud Migrations on Security Perimeters

The Impact of Remote Work and Cloud Migrations on Security Perimeters Pierluigi Paganini May 27, 2024 Organizations had to re-examine…

A Remote Hash Lookup Service To Identify Malware
27
May
2024

A Remote Hash Lookup Service To Identify Malware

Today marks a significant milestone for Malcat users with the release of version 0.9.6, introducing Kesakode, a remote hash lookup…

Best Password Generators of 2024 to Secure Your Accounts
27
May
2024

Best Password Generators of 2024 to Secure Your Accounts

Overview of best password generators to secure online accounts By Mia Naumoska, CMO at Internxt Despite the current advances in…

Hajj Pilgrimage Hit by Extensive Phishing and Data Theft Scams
27
May
2024

Hajj Pilgrimage Hit by Extensive Phishing and Data Theft Scams

Cybersecurity threats rise during this peak season as millions embark on the annual Hajj pilgrimage. This article offers crucial tips…

Cybercrime
27
May
2024

Moroccan Cybercrime Group Steals Up to $100K Daily Through Gift Card Fraud

Microsoft is calling attention to a Morocco-based cybercrime group dubbed Storm-0539 that’s behind gift card fraud and theft through highly…

World CyberCon Meta Edition
27
May
2024

World CyberCon META Edition Concludes Successfully In Dubai

Dubai, UAE – May 24, 2024 – The Cyber Express proudly announces the successful conclusion of the third edition of…