Trend Micro researchers have been monitoring a threat actor known as Water Orthrus since 2021, as they employed pay-per-install networks...
There will be a surge in dedicated cybersecurity committees in organisations across the world in the next few years, according to new data released today from...
The British Mensa website has suffered a cyber-attack following reports from disgruntled employees that the organization failed to protect its members’ data. British Mensa, which has around 18,000...
Cisco’s SpamCop anti-spam service suffered an outage Sunday after its domain was mistakenly allowed to expire. SpamCop provides a Real-time Blackhole List (RBL) that mail servers...
Just when we thought 2020 couldn’t get worse, security firm FireEye broke the news that the compromise of a software solution by IT solutions provider SolarWinds...
A malicious Home Depot advertising campaign is redirect Google search visitors to tech support scams. Malicious Google search ads are nothing new, with campaigns for Amazon Prime, PayPal,...
An ongoing attack campaign was first discovered and reported by Google’s Threat Analysis Group (TAG) a week ago. Now, the same campaign has been monitored by Microsoft. What...
The Rocke Group, known for targeting cloud infrastructures with cryptojacking attacks, is back in action. Its cloud-targeted cryptojacking malware named Pro-Ocean has recently got new and improved rootkit...
In this article, we discuss how two-factor authentication has been evolved to address the shortcoming of single authentication systems. We also discuss how we can utilize...
The popular conspiracies on Weibo about the origins of COVID-19 differ substantially from those in the U.S. Conspiracy theories about COVID-19 have accompanied the pandemic from...
As lawmakers and law enforcement continue to unravel the events and impact of the crisis at the U.S. Capitol on Wednesday, January 6th, attention is turning...
Recent Comments