No one would argue that 2022 was a challenging year. One constant has been the ongoing evolution of technology, innovation,…
Play ransomware group has listed a US-based technology company A10 Networks as a victim. A10 Networks provides automated cybersecurity solutions…
A flaw in the Money Lover financial app for Android, iOS, and Windows allowed any logged-in member to see the…
Twitter’s direct messages have always been a security liability. The DMs you send to friends and internet strangers aren’t end-to-end encrypted,…
ASCON is the name of the group of lightweight authenticated encryption and hashing algorithms that the U.S. National Institute of…
Feb 09, 2023Ravie LakshmananCyber Attack / Cyber Threat A previously unknown threat actor dubbed NewsPenguin has been linked to a…
An organisation that provides a code of practice for banks has called on signatory banks to introduce transaction monitoring technology…
January has registered a dip in public ransom notes, compared to the previous month as well as the same period…
Alibaba is developing a ChatGPT-style tool that is currently in internal testing, joining a race by tech companies globally to…
Scammers are now exploiting the ongoing humanitarian crisis in Turkey and Syria: this time stealing donations by abusing legitimate platforms like PayPal…
Lately, a number of individuals have been encountering difficulties with the Tor network in terms of connectivity and performance. It’s…
The Tor Project revealed that its network has been suffering from “several different types of ongoing DDoS attacks (Distributed Denial…