Users Falling Victim to Social Engineering Scams
Check Point’s Live Cyber Threat Map identified 20,000 instances of QR code phishing and malware attacks within two weeks, highlighting...
Read more →Check Point’s Live Cyber Threat Map identified 20,000 instances of QR code phishing and malware attacks within two weeks, highlighting...
Read more →ESET researchers have discovered NSPX30, a sophisticated implant used by a new China-aligned APT group, which they dubbed Blackwood. Blackwood...
Read more →The 2023/2024 Axur Threat Landscape Report provides a comprehensive analysis of the latest cyber threats. The information combines data from...
Read more →The year 2023 was another one characterised by uncertainty. Once again, global instability has muddied the waters, making coming up...
Read more →All types of cyber threat actor are already using artificial intelligence (AI) to varying degrees, UK National Cyber Security Centre’s...
Read more →A previously undocumented China-aligned threat actor has been linked to a set of adversary-in-the-middle (AitM) attacks that hijack update requests...
Read more →For a growing number of organisations, the default option for new IT projects is the cloud and cloud storage, with...
Read more →Russia-linked APT group Midnight Blizzard hacked Hewlett Packard Enterprise (HPE) Pierluigi Paganini January 25, 2024 Hewlett Packard Enterprise (HPE) revealed...
Read more →On December 12, 2023, Hewlett Packard Enterprise (HPE) received chilling news: the notorious nation-state actor Midnight Blizzard, also known as...
Read more →Hackers in India are using fake loan applications to target Android users to take advantage of the rising demand for...
Read more →A new MacOS stealer has surfaced on the dark web, causing concern among cybersecurity experts. Operating under a mysterious name,...
Read more →Automated Emulation is an open-source Terraform template designed to create a customizable, automated breach and attack simulation lab. The solution...
Read more →