
After helping Russia on the ground North Korea targets Ukraine with cyberespionage
North Korea’s involvement in the war in Ukraine extends beyond sending soldiers, munitions, and missiles to […]
Google patches Chrome vulnerability used for account takeover and MFA bypass
Chrome users are advised to update their browser immediately to fix a critical vulnerability that is […]
Risks and Mitigation of Malware Explained: Top 5 Strategies
Malware—short for malicious software and malicious programs—is one of the most dangerous cybersecurity threats today. From […]

Stealth RAT uses a PowerShell loader for fileless attacks
>Threat actors have been spotted using a PowerShell-based shellcode loader to stealthily deploy Remcos RAT, a […]

Alternatives to Microsoft Outlook webmail come under attack in Europe
CISOs need to ensure that web email clients and browsers are kept up to date following […]

Data on sale: Trump administration withdraws data broker oversight proposal
The US Consumer Financial Protection Bureau has withdrawn a proposed rule that would have restricted data […]

The most effective phishing QR code is a new drug and alcohol policy supposedly from HR
Phishing emails that appear to be internal and come from the IT or HR department are […]

‘Aggressive, creative’ hackers behind UK breaches now eyeing US retailers
Google has warned that a hacking group linked to “Scattered Spider,” which is believed to be […]

Hacker nehmen Rüstungslieferanten der Ukraine ins Visier
Russische Hacker greifen gezielt Rüstungsfirmen an, die die Ukraine mit Waffen versorgen. PeopleImages.com – Yuri A […]

How phones get hacked: 7 common attack methods explained
The smartphone revolution was supposed to provide a second chance for the tech industry to roll […]