The US government warns of escalating cyber threats from the Interlock ransomware group, which targets businesses and critical infrastructure with…
Read More »cybersecurity threats
The eCommerce sector is experiencing a surge in fraudulent activities driven by financial pressures, geopolitical instability, and evolving cyber threats,…
Read More »The Lumma infostealer malware has rapidly resumed operations after a law enforcement takedown, showcasing cybercriminals' resilience and ability to rebuild…
Read More »Chinese-linked hacking groups (Linen Typhoon, Violet Typhoon, Storm-2603) are exploiting critical Microsoft SharePoint vulnerabilities (CVE-2025-53770, CVE-2025-53771) to steal data or…
Read More »Microsoft identified Chinese state-linked hacking groups exploiting critical SharePoint vulnerabilities to infiltrate global organizations, involving groups like Linen Typhoon, Violet…
Read More »Dell confirmed a security breach by extortion group World Leaks, targeting its product demonstration platform, but stated no sensitive customer…
Read More »Cybercriminals are hiding malware in DNS records by converting binaries into hexadecimal chunks and distributing them across subdomains, evading traditional…
Read More »The rise of connected vehicles has revolutionized fleet management but introduced significant cybersecurity risks, requiring zero-trust approaches, real-time monitoring, and…
Read More »Marks & Spencer's chairman confirmed a ransomware attack by the Scattered Spider group using DragonForce malware, disrupting operations but avoided…
Read More »An AI-generated impersonation of US Secretary of State Marco Rubio targeted foreign officials, highlighting the growing threat of deepfake technology…
Read More »Data breaches are increasingly common in the UK, posing risks to consumers, but proactive measures can mitigate potential harm. Cyberattacks…
Read More »A new ransomware called "Bert" is targeting global organizations across healthcare, tech, and event management sectors, with attacks tracked since…
Read More »Android 16 will introduce alerts for users when connecting to fake cell towers or unencrypted networks, helping combat unauthorized surveillance…
Read More »The CVE Program has launched two new working groups, the CVE Consumer Working Group (CWG) and CVE Researcher Working Group…
Read More »Scattered Spider, a group of young hackers, has surged in cyberattacks on critical industries using social engineering to exploit corporate…
Read More »A pro-Russia disinformation campaign is using freely available AI tools to spread fabricated content online, targeting elections, immigration, and the…
Read More »Critical cybersecurity vulnerabilities in Linux SOHO devices (LapDogs), WinRAR (CVE-2025-6218), and Notepad++ (CVE-2025-49144) demand urgent patching to prevent unauthorized access…
Read More »Cyber threats are shifting toward stolen credentials and built-in system tools, requiring proactive security measures as traditional perimeter defenses become…
Read More »ICE's use of facial recognition via the Mobile Fortify app on smartphones raises privacy and civil liberties concerns, with critics…
Read More »ClickFix attacks, exploiting human psychology through deceptive error messages, surged by 517% in 2025, becoming the second most prevalent cyber…
Read More »