Microsoft has alerted the software company CyberLink regarding the misuse of its software by the North Korean group “Diamond Sleet”, a cyber gang that...
A new twist has been introduced to the DDoS attack narrative, with novel approaches allowing cybercriminals to bypass geoblocking defenses, flooding servers more frequently...
Close to a million files containing sensitive private information of minors were left completely exposed to anyone on the internet, thus posing a threat...
All websites in the UK received a 30-day deadline from Britain’s Information Commissioner’s Office to ensure that they allow users to both accept and...
A recent report shows that diplomatic relations do not necessarily extend to cyberspace- most cyberattacks on Russia are apparently coming from its allies. Turns...
In our increasingly digital society, privacy is getting more and more important, and according to the European General Data Protection Regulation there is a...
These cybersecurity experts from China are keeping data safe by tapping into quantum physics.
The increasing use of cloud storage has brought with it an...
This threat actor is now using an infection chain based on delivering a new initial access downloader dubbed IronWind, as was observed by cybersecurity...
iHLS is an accelerator for the security sector and its various unique characteristics that provides startups with recognition, international exposure, access to investors and...
A new malware campaign targeting visitors of the “Windows Report” portal was uncovered by security experts at the cyber firm Malwarebytes. In this campaign,...
QR code-based phishing attacks (also called “quishing”) are rising, with threat actors using malicious QR codes to steal valuable data and money. Furthermore, experts...
The European Space Agency (ESA) announced that it will use artificial intelligence to reduce space garbage and protect infrastructure from space-based threats like space...
Is there honor among thieves? Don’t be so sure- cybersecurity firm HP Wolf Security has detected fake malware designed to lure wannabe digital crooks...
44% of users worldwide reportedly reuse their passwords on multiple accounts, putting tons of sensitive data at risk.
Dashlane is a password manager, and its...
A group of digital security researchers at the University of Wisconsin–Madison discovered that contrary to popular belief, our data is not always protected when...
Our homes and home appliances are constantly getting smarter, getting upgraded, connecting to your WiFi, and using apps on your mobile phone. However, according...
Not long after the public was introduced to artificial intelligence models like ChatGPT, scammers launched programs like FraudGPT to assist criminals by crafting an...
This September marks a never-before-seen level of ransomware attacks, with 514 victims exposed in leak sites and new threat actors emerging, as revealed by...
New research from IBM proves how closely AI-enabled tools have perfected the art of writing phishing emails and fooling victims. Cybersecurity professionals and government...