Latest News
New Morphing Meerkat Phishing Kit Exploits DNS to Spoof 100+ Brands
A recent analysis published by Infoblox reveals a sophisticated phishing operation, dubbed Morphing Meerkat, actively exploiting DNS…
How to Implement CMMS Software in Your Organization
Let’s face it: Rolling out new software across an entire organization can feel like herding cats. Between data migration, staff training, and…
Engaging Online Learning: Strategies to Keep Students Focused and Motivated
While inundated with ideas, you also need to consider how to present them effectively and structure the course to engage your learners. One…
Russian Phishing Uses Fake CIA Sites to Target Anti-war, Ukraine Supporters
The phishing campaign is highly sophisticated!
Fake Snow White Movie Torrent Infects Devices with Malware
Disney’s latest Snow White movie, with a 1.6/10 IMDb rating, isn’t just the biggest flop the company has ever released. It’s such an…
OpenAI Bug Bounty Program Increases Top Reward to $100,000
OpenAI Bug Bounty program boosts max reward to $100,000, expanding scope and offering new incentives to enhance AI security and reliability.
RedCurl Uses New QWCrypt Ransomware in Hypervisor Attacks
Discover the novel QWCrypt ransomware used by RedCurl in targeted hypervisor attacks. This article details their tactics, including DLL…
G2 Names INE 2025 Cybersecurity Training Leader
Cary, North Carolina, 27th March 2025, CyberNewsWire
Aussie Fintech Vroom Exposes Thousands of Records After AWS Misconfiguration
Cybersecurity researcher Jeremiah Fowler discovered a data exposure at Australian fintech Vroom by YouX, exposing 27,000 records, including…
Internet Archive (Archive.org) Goes Down Following “Power Outage” (Updated)
The Internet Archive (Archive.org), home to the Wayback Machine, is temporarily offline due to a reported power outage. Engineers are working…
Penetration Testing Services: Strengthening Cybersecurity Against Evolving Threats
Cybersecurity threats are evolving at an unprecedented pace, leaving organizations vulnerable to large-scale attacks. Security breaches and…
New npm Malware Attack Infects Popular Ethereum Library with Backdoor
Security researchers at ReversingLabs have discovered a new malware campaign on the npm package repository, revealing a new approach to…