The illegal darknet marketplace Nemesis Market, based in Germany and Lithuania, was recently seized by the Frankfurt Main Public Prosecutor’s Office, the Central Office...
Russia is reportedly using a new and extremely capable malware variant to target Ukrainian telecommunication networks.
Cybersecurity threat intelligence platform SentinelLabs reports the new Russian...
The healthcare industry needs to wake up and focus on securing its infrastructure.
We have reported on many cyberattacks on various health infrastructures, hospitals, and...
The hacktivist group ‘Anonymous’ has claimed a recent breach of Israel’s nuclear facility networks in Dimona as a protest against the war with Gaza....
Microsoft set to release Copilot for Security AI tool to help cybersecurity workers produce summaries of suspicious incidents and identify hackers’ methods to conceal...
Software company Salt Labs reveals that ChatGPT plugins that let it interact with external programs and services have vulnerabilities that could be exploited during...
Several government departments in France fell victim to multiple cyberattacks of "unprecedented intensity,” and hacktivist group Anonymous Sudan is claiming responsibility.
The French Prime Minister’s...
North Korean hackers have stolen vital microchip information from South Korean chip makers, according to reports from South Korea’s National Intelligence Service (NIS).
“We believe...
Quantum computers can solve complex problems exponentially faster than classical computers and are hailed as the future of computing; however, they are still vulnerable...
Many companies are integrating generative AI tools into their products to reduce the human workload and make hard tasks easier, which is both transformative...
Cybersecurity company Cybereason reveals that the actual price of a ransomware attack on a business includes much more than the ransom itself.
When choosing whether...
Malicious romance cybercriminal steals close to a quarter million dollars from a victim in a months-long online scam.
This type of online scam is also...
The expansion of the digital realm into space has opened new frontiers for cyber threats, posing unprecedented challenges.
The satellites orbiting Earth are crucial for...
Hackers can now create clones of WiFi hotspots and intercept data, as well as enable unauthorized access to protected home Wi-Fi networks and expose...
Nowadays, fingerprints are one of the most popular forms of personal identification, whether it’s unlocking your phone, approving online payments, access control, and many...
UK and US law enforcement led an international operation, successfully disrupting the Russian-linked ransomware specialist LockBit, one of the most harmful cybercrime groups in...
The US Department of Justice claims to have taken down a global botnet controlled by GRU, Russia’s military intelligence agency. The botnet reportedly consisted...