Impersonation scams in the U.S. exceeded $1.1 billion in losses last year, according to statistics collected by the Federal Trade…
Security researchers have uncovered a critical vulnerability in the Linux kernel’s io_uring subsystem, which could allow attackers to gain full root access…
A startling revelation has identified a dangerous security vulnerability in the xz compression utility, specifically within its liblzma library. This…
AT&T Acknowledges Data Breach AT&T, one of America’s leading telecom brands, has confessed to a significant data breach, revealing that…
New Vultur malware version includes enhanced remote control and evasion capabilities Pierluigi Paganini April 01, 2024 Researchers detected a new…
Data belonging to more than 1.3 million customers of the PandaBuy online shopping platform has been leaked, allegedly after two…
Vultur, Android banking malware, has been observed incorporating new technical features, which allow the malware operator to remotely communicate with…
Detecting threats and vulnerabilities in real-time is crucial for an effective cybersecurity strategy to protect against cybercriminals. By Or Shoshani,…
Active since 2023, the Mysterious Werewolf cluster has shifted targets to the military-industrial complex (MIC) by using phishing emails with…
[by Intellinexus CEO Jacques du Preez] Businesses are constantly seeking new ways to gain a competitive edge and drive…
Apr 01, 2024NewsroomCryptocurrency / Financial Fraud The Indian government said it has rescued and repatriated about 250 citizens in Cambodia…
Coming from a military intelligence background, focusing on the financing of terrorist groups, I saw the power of the dollar…











