Blogs
Posted on: 24-07-2024
Daggerfly Enhances Malware Toolkit to Target All Major Operating Systems
Posted on: 24-07-2024
Verizon Settles for $16 Million Over TracFone Data Breach: New Security Measures Required
Posted on: 24-07-2024
FrostyGoop Malware Incident: Impact on Lviv's Heating Systems and Implications for ICS Security
Posted on: 23-07-2024
Teenage Cybercriminal Linked to Scattered Spider Arrested
Posted on: 23-07-2024
Wave of Cyberattacks Hits Greece’s Land Registry: Data Breach and Defense Measures
Posted on: 23-07-2024
Google Reverses Course on Phasing Out Third-Party Cookies in Chrome
Posted on: 23-07-2024
Global IT Outage: CrowdStrike Falcon Sensor Update Mishap and Resulting Cyber Threats
Posted on: 22-07-2024
New Linux Variant of Play Ransomware Targeting VMware ESXi Systems
Posted on: 22-07-2024
SocGholish Malware Exploits BOINC Project for Covert Cyberattacks
Posted on: 22-07-2024
North Korean Hackers Target macOS Users with New Malware Variant Disguised as Video Call Service
Posted on: 22-07-2024
LockBit Ransomware Affiliates Convicted: A Landmark in Global Cybercrime Crackdown
Posted on: 19-07-2024
Unveiling the Wallet behind the Cyber Heist WazirX: A Deep Dive by Foresiet