Latest News
RansomHub: The New King of Ransomware? Targeted 600 Firms in 2024
RansomHub emerges as a major ransomware threat in 2024, targeting 600 organizations after ALPHV and LockBit disruptions. Group-IB reveals its…
N. Korean Hackers Suspected in DEEP#DRIVE Attacks Against S. Korea
A phishing attack dubbed DEEP#DRIVE is targeting South Korean entities, with thousands already affected. North Korean hackers from the Kimsuky…
Scammers Exploit JFK Files Release with Malware and Phishing
Veriti Research reported a developing cyber threat campaign centred around the declassification and release of the RFK, MLK and JFK files.…
Microsoft Uncovers ‘BadPilot’ Campaign as Seashell Blizzard Targets US and UK
Russian GRU-linked hackers exploit known software flaws to breach critical networks worldwide, targeting the United States and the United…
Doxbin Data Breach: Hackers Leak 136K User Records and Blacklist File
Doxbin Data Breach: Hackers leak 136,000+ user records, emails, and a ‘blacklist’ file, exposing those who paid to keep their info off the…
Astaroth Phishing Kit Bypasses 2FA to Hijack Gmail and Microsoft Accounts
New Astaroth Phishing Kit bypasses 2FA (two-factor authentication) to steal Gmail, Yahoo and Microsoft login credentials using a reverse…
FortiOS Vulnerability Allows Super-Admin Privilege Escalation – Patch Now!
Super-admin access vulnerability discovered in FortiOS Security Fabric. Exploitation could lead to widespread network breaches. Update now.…
Massive 1.17TB Data Leak Exposes Billions of IoT Grow Light Records
Massive 1.17 TB data leak exposes billions of records from a Chinese IoT grow light company. Wi-Fi passwords, IP addresses, and device IDs are…
Online Threats Are Rising -Here’s Why Companies Must Improve Their Cybersecurity
Cybersecurity is a must as online threats rise. Businesses must train employees, back up data, and adopt strong security practices to prevent…
Patch Tuesday: Microsoft Fixes 63 Bugs with 2 Zero-Days
Microsoft’s February Patch Tuesday addresses 63 security vulnerabilities, including two actively exploited zero-days. Update your…
Apple Confirms ‘Extremely Sophisticated’ Exploit Threatening iOS Security
Apple fixes the USB Restricted Mode flaw in iOS 18.3.1 and iPadOS 18.3.1. Vulnerability exploited in targeted attacks. Update your…
What Is a Personal VPN? Features, Benefits, and How It Works
Privacy, security, and unrestricted access are the promises of a personal VPN. But what does it actually do, and why do so many people rely on…