Credential abuse is something that happens only to CEOs or very rich people or employees of fortune 500 companies right? Nope. It’s...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a security alert about Karakurt, a cybercriminal extortion group that extracts data...
In a joint statement, the Federal Bureau of Investigation (FBI) and the U.S. Department of Justice (DOJ) announced the seizure of the...
Although the Chinese government has resisted openly expressing its support for Russia and its decision to invade Ukraine, Beijing state media appears...
A recent investigation details how an unidentified hacking group compromised the email accounts of entities linked to the Russian government using four...
This weekend, vpnMentor researchers identified in Telegram 4 storage files with a total of 8.7 GB of information belonging to customers of...
A cybercriminal group claims to have compromised the systems of a robotics company specializing in surveillance solutions around the world. Identified as...
For years, cybersecurity specialists have recommended that social media users share as little information as possible in order to avoid all kinds...
IKEA, the famous multinational dedicated to the manufacture and sale of furniture, appliances and other household goods, confirmed that it has submitted...
The Narcotics and Economic Crimes Investigations (NECI) Task Force, a specialized unit of California police, has expanded its list of names of...
The U.S. Department of Justice (DOJ) announced that Sercan Oyuntur, a 40-year-old Californian citizen, was convicted of six counts related to a...
Singapore Cyber Security Authority (CSA) confirmed that any tech company offering cybersecurity services or products should be licensed in order to perform...
OK, so 2021 wasn’t a good year, and 2022 hasn’t fared any better where cybersecurity and vulnerabilities are concerned. Ubisoft is one...
Cisco Talos researchers reported detecting a new hacking campaign by the group identified as Transparent Tribe and targeting government organizations in India....
Phishing is still one of the most common and efficient cybercriminal practices, since in many cases attackers target unsuspecting users without knowledge...
Users of the WhatsApp version for laptops and desktops will now be able to use a browser extension to check the integrity...
Researchers published research detailing a method for taking control of smart speakers, which would allow threat actors to make phone calls, access...
Facial Liveness Verification (FLV) technology is one of the most modern security implementations, currently used for identity authentication in web domains that...
A bug in the Hive ransomware encryption algorithm would allow victims to recover their information without having to negotiate with hackers. This...
Any hacking group could be sentenced to 25 years in prison for their cyberattack campaigns targeting critical infrastructure in Australia. Under the...
A security alert issued by the Federal Bureau of Investigation (FBI) signals the detection of a wave of the attack known as...