The Spanish National Police has apprehended a Ukrainian national wanted internationally for his involvement in a scareware operation spanning from 2006 to 2011. This extensive operation led...
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: CISO perspective on why boards don’t fully grasp cyber attack risksIn...
While trends in phishing frequently evolve, Facebook and Microsoft’s collective dominance as the most spoofed brands continues, according to Vade. Facebook and Microsoft’s collective dominance as the most spoofed...
It was to be expected: As the buzz around Meta’s new microblogging platform Threads gained momentum, some individuals have stepped in to take advantage of the...
In today’s age of widespread device collaboration, the number of endpoints within an organization is often enormous. On top of this, Endpoints are now among the...
An unrecorded .NET Loader was identified during routine threat hunting that downloads, decrypts, and executes a wide range of malicious payloads. Multiple threat actors extensively distributed...
Generative AI technology is rapidly growing and advancing, driven by continuous research and development efforts. But, besides the growing advancements and positive things, these generative AI...
The latest research reveals a new sophisticated attack carried through Webapk technology targeting Android devices. The threat actors manipulate the user to install malicious web apk...
The significant plunge in cyber crimes shows a decent rise in legitimate services in the mid of this year, 2023. However, the rise in ransomware attacks...
Russia’s invasion of Ukraine on February 24, 2022, followed escalating cyber operations, categorized into six phases, by Russian troops amassed at the border. Beyond the focus...