Telegram now the go-to place for selling phishing tools and services
Telegram has become the working ground for the creators of phishing bots and kits looking to market their products to a larger audience or to…
Telegram has become the working ground for the creators of phishing bots and kits looking to market their products to a larger audience or to…
Despite the decline in network-detected malware in Q4 2022, endpoint ransomware spiked by 627%, while malware associated with phishing campaigns persisted as a threat, according…
Critical infrastructure attacks are a preferred target for cyber criminals. Here’s why and what’s being done to protect them. What is Critical Infrastructure and Why…
Endpoint detection and response (EDR), multifactor authentication (MFA) and privileged access management (PAM) have long been the three tools most commonly required by cyber insurers…
LockBit ransomware group has allegedly breached private equity firm Nautic. Cybersecurity researchers shared details regarding the alleged Nautic cyberattack stating that the LockBit ransomware group…
In August last year, Offensive Security announced that it was retiring the long-standing Offensive Security Certified Expert (OSCE) certification and replacing it with three courses,…
Taiwanese PC parts maker MSI (Micro-Star International) has been listed on the extortion portal of a new ransomware gang known as “Money Message,” which claims…
Just-in-time logistics mean that even short-term cyberattacks can have serious consequences. Hacks that disrupt fertilizer or pesticide production can force farmers to sit out planting seasons. Breaches…
Google has introduced a new data deletion policy for the Google Play Store with the intention of giving customers more knowledge and control over their…
Google Play will be pushing Android app developers to allow users to delete their account and associated data from within the app. Users will also…
A total of 91 new victims were added to the Clop (aka Cl0p) ransomware leak site during March 2023, more than 65% of the total…
One of the more interesting things I’ve had the opportunity to hack on is the Tesla Model 3. It has a built in web browser,…