Raspberry Robin is a malicious worm that spreads through USB drives, and it’s been actively used by the threat actors…
Phishing has been one of the primary methods threat actors use for impersonating individuals or brands with a sense of…
Microsoft, the renowned technology giant based in the United States, has recently made headlines due to targeted spear phishing campaigns…
12 Feb 90+ Cyber Crime Statistics 2024: Cost, Industries & Trends This week in cybersecurity from the editors at Cybercrime…
The Federal Communications Commission (FCC) has announced that calls made with voices generated with the help of Artificial Intelligence (AI)…
By Published: 12 Feb 2024 As an enterprise-focused developer advocate, a major part of my role involves helping organisations identify…
A new backdoor written in Rust has been discovered to target macOS users with several interesting features. Moreover, there have…
Federal authorities have dismantled a major malware operation, seizing online marketplaces and being involved in its sale and support. This…
Discover how scammers employ QR codes and fake voicemails for credential harvesting, with over 1,000 attacks detected in the last…
While most organizations focus cybersecurity efforts on fortifying their networks, the mobile devices connected to them often remain vulnerable. In…
Canada Gov plans to ban the Flipper Zero to curb car thefts Pierluigi Paganini February 12, 2024 The Canadian government…
International humanitarian law prohibits attacks on hospitals and health care facilities, or against patients, doctors, and their means of transport,…











