Before smartphones were popular, people didn’t take mobile security much seriously. After all, we used to have a few contacts, some classic...
Smart devices definitely make our lives easier, faster, and more efficient, but unfortunately, an insecure smart device can also ruin your day,...
While most people worry about threats from hackers trying to breach their security from the outside, it’s just as, if not more,...
Amazon CEO Jeff Bezos, via a long post on Medium, has accused the National Enquirer’s parent company, American Media Inc. (aka AMI),...
OceanLotus group known for Multiple attack campaigns around the globe, the threat actor group targets private sectors across multiple industries, foreign governments,...
Recently we have seen more increase in various threats and the ways of intruding the network and there were increase by APT...
If the connectivity and security of your organization rely on Cisco RV320 or RV325 Dual Gigabit WAN VPN routers, then you need...
Insider Threat is one of the dangerous threat actors for many organization and keeping your business protected from outside threats is hard...
Legislators from both political parties presented a bill designed to protect American technological infrastructure Senators Marco Rubio (Republican Party) and Mark Warner...
In an announcement posted on Pastebin, the hacker group TheDarkOverlord told that it has been successful in breaching law firms that handle cases...
Cybersecurity specialists from the International Institute of Cyber Security already predicted that this would be a difficult year for users and organizations,...
Extortion emails which carried bomb threats caused panic in various cities across the U.S. and police had to tell people to stay...
This extortion scheme has received massive attention from the media, although it has not achieved so many funds Police departments across the...
“Pay $20,000 worth of bitcoin, or a bomb will detonate in your building” A massive number of businesses, schools, government offices and...
As the threat of bogus apps continues, what can we do to protect ourselves against these fraudulent practices?
Cyber Criminals from TA505 group started a new campaign that targeting retail, grocery, and restaurant chains by distributing weaponized MS word documents....
The company fears a credential stuffing attack in ShareFile Information security and digital forensics specialists from the International Institute of Cyber Security...
2017 was a year of ransomware, primarily the WannaCry malware that made $4 billion in profits from the ransom payments of its...
The 2019 International HLS & Cyber Expo is all set to be the largest cybersecurity conference and exhibition in Israel. Attracting global...
Australia’s spy chief says that China’s Huawei could pose a great security threat to the country’s infrastructure, especially the water supply and...
Removal storage and USB thumb drives are serious security threats and could cause massive damage to industrial systems, as per a new...