Hackers prefer phishing as it exploits human vulnerabilities rather than technical flaws which make it a highly effective and low-cost…
Hackers use loaders to bypass security measures and run harmful code in a genuine process’s memory themselves. This makes it…
A ransomware operation targets Windows system administrators by taking out Google ads to promote fake download sites for Putty and WinSCP. WinSCP…
The Android banking trojan “Grandoreiro” is spreading in a large-scale phishing campaign in over 60 countries, targeting customer accounts of roughly 1,500…
North Korea-linked IT workers infiltrated hundreds of US firms Pierluigi Paganini May 18, 2024 The U.S. Justice Department charged five…
18 May 91 Percent Of CEOs Treat Cybersecurity As A Technical, Compliance Issue And Leave It To CIOs, CISOs Posted…
Laser warfare, among all the long-unfulfilled imaginings of science fiction writers, is right up there with flying cars. Now it’s…
This week on TCE Cyberwatch, we delve into the recent hackings of major organizations, including the International Baccalaureate, Boeing, and…
By Puneet Gupta, Vice President and Managing Director, NetApp India/SAARC Propelled by the evolving trends in data, data virtualization is…
Turla APT used two new backdoors to infiltrate a European ministry of foreign affairs Pierluigi Paganini May 17, 2024 Russia-linked…
This week was pretty quiet on the ransomware front, with most of the attention on the seizure of the BreachForums…
Researchers have identified a recent cyber espionage campaign by a China-linked threat actor dubbed “UNK_SweetSpecter,” which aims to harvest generative…











