Cybersecurity Blog
Fake and Stolen X Gold Accounts Flood Dark Web
A surge of fake or stolen X (Twitter) Gold accounts has been flooding marketplaces and forums both on the surface web ...
Qualcomm chip vulnerability enables remote attack by voice call
Qualcomm disclosed a critical vulnerability on New Year’s Day that would allow remote attacks via malicious voice calls ...
SonicWall acquires Banyan to boost zero-trust, SSE offerings | TechTarget
Security vendor SonicWall is expanding its zero-trust network offerings with the acquisition of Banyan Security. On ...
CISA Warns of Actively Exploited Bugs in Chrome and Excel Parsing Library
The CISA has identified two recently patched vulnerabilities, one in Google Chrome and another in the open-source Perl ...
Cross Switch Suffers Data Breach: 3.6 Million Records Allegedly Exposed
Cross Switch, a leading company in online payment gateway management, is currently dealing with the repercussions of a ...
Malware Using Google MultiLogin Exploit to Maintain Access Despite Password Reset
Jan 03, 2024NewsroomMalware / Data Theft Information stealing malware are actively taking advantage of an undocumented ...
Hacktivists Shut Down Top State-Owned Belarusian News Agency
Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Government Belarusian Cyber-Partisans Claim ...
Generative AI’s role in enhancing cyber security
By the end of 2024, it is plausible that AI systems will be capable of autonomously managing cyber security across an ...