Nigerian National Pleads Guilty for Hacking Business & Email
Henry Onyedikachi Echefu, a 32-year-old Nigerian national, has admitted to his role in a sophisticated business email compromise (BEC) scheme and money laundering activities. This…
Henry Onyedikachi Echefu, a 32-year-old Nigerian national, has admitted to his role in a sophisticated business email compromise (BEC) scheme and money laundering activities. This…
Cybersecurity researchers at ESET identified the cyberespionage campaign, highlighting how hackers compromised both the Tibetan news website Tibetpost and the website of the Monlam Festival,…
Mar 08, 2024The Hacker NewsSecrets Management / Access Control In the realm of cybersecurity, the stakes are sky-high, and at its core lies secrets management…
GitLab has announced the release of updated versions for its Community Edition (CE) and Enterprise Edition (EE) platforms. These updates address critical vulnerabilities that could…
International Women’s Day has long been an advocate for elevating and advancing gender equality within the technology industry. At the heart of this celebration is…
The Coper malware, a descendant of the Exobot malware family, was first distributed as a fake version of Bancolombia’s ‘Personas’ application. Fast forwarding to 2022,…
By Jasmine Harrison PC.dp, Account Manager – Data Protection People Women play an important role in the field of data protection, bringing diverse perspectives and…
Evasive Panda dubbed BRONZE HIGHLAND and Daggerfly, a Chinese-speaking APT group operating since at least 2012, has been spotted conducting cyberespionage targeting individuals in mainland China,…
CrowdStrike announced its acquisition of Flow Security, the industry’s first cloud-native data runtime security solution. This move positions CrowdStrike as a leader in modern cloud…
Threat actors target email addresses, as they provide a way to access personal and confidential information. Emails often hold valuable data such as financials, login…
Mar 08, 2024NewsroomEndpoint Security / Network Security Threat actors have been observed leveraging the QEMU open-source hardware emulator as tunneling software during a cyber attack…
In the fast-paced world of cybersecurity, diversity isn’t just a buzzword; it’s a necessity for success. Yet, the door to this vital sector remains disproportionately…