Two-factor authentication (2FA) is a security method that requires two verification steps for user access and is commonly implemented with…
The Mali GPU driver is a widely used Graphical Processing Unit for multiple devices, including Android and Linux. A new…
Jun 11, 2024NewsroomMobile Security / Technology Arm is warning of a security vulnerability impacting Mali GPU Kernel Driver that it…
The popular Japanese video-sharing website Niconico has suspended its services due to a large-scale cyberattack. Niconico is one of Japan’s…
Jun 11, 2024NewsroomData Theft / Cloud Security As many as 165 customers of Snowflake are said to have had their…
A month after a cyberattack on Ascension, one of the largest nonprofit healthcare systems in the United States, continues to…
The notorious TellYouThePass ransomware gang exploits a critical remote code execution (RCE) vulnerability in PHP to compromise servers and deploy…
Officers have made two arrests in connection with using a “text message blaster,” believed to have been used to send…
In rural healthcare settings, the IT infrastructure often lags behind due to various challenges such as limited budgets, political constraints,…
INC Ransom group has targeted the building technology solutions provider, ControlNET LLC. The ControlNET cyberattack on June 10, 2024, allegedly…
In the first part of our series, we disclosed how an exclusive report by The Cyber Express played a pivotal…
Swoop has divested its wholesale voice business in an all-cash sale to mobile communications provider Pivotel. Gold Coast-based Pivotel will…











