Dec 01, 2023NewsroomMobile Security / Banking Security Cybersecurity researchers have disclosed a new sophisticated Android malware called FjordPhantom that has…
The UK government must “proceed with caution” when developing and deploying artificial intelligence (AI) for military purposes, particularly autonomous weapons…
Black Basta Ransomware gang accumulated at least $107 million in Bitcoin ransom payments since early 2022 Pierluigi Paganini December 01,…
Hackers use Remote Access Trojans (RATs) to gain unauthorized access and control over a victim’s computer remotely. RATs allow threat…
Attackers are exploiting three critical vulnerabilities in internet-facing Qlik Sense instances to deliver Cactus ransomware to target organizations, Arctic Wolf…
Dec 01, 2023NewsroomPrivacy / Data Protection Meta-owned WhatsApp has launched a new Secret Code feature to help users protect sensitive…
In a post-Covid world all organisations have had to adapt to new ways of working. The transition to remote working…
The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer malware, and its new variant was being marketed in…
Dec 01, 2023NewsroomMalware / Cyber Espionage A suspected Chinese-speaking threat actor has been attributed to a malicious campaign that targets…
Almost 60% of workers in the UK have had no training in digital skills, according to research by CV Genius….
Zyxel has patched six vulnerabilities affecting its network attached storage (NAS) devices, including several (OS) command injection flaws that can…
Dec 01, 2023The Hacker NewsMalware / Cyber Threat The U.S. Department of Justice (DOJ) and the FBI recently collaborated in…











