Cybersecurity Blog
Why companies are investing in cloud security
Discover why cloud security is becoming a priority for organizations Add bookmark Investment in cloud security is ...
Remcos RAT Disguises as Payslip to Infect Users | Cyware Hacker News
Researchers have encountered a new phishing campaign that is being used to distribute the notorious Remcos RAT. The ...
QR Code-based Phishing Attains 587% Hike, Reports Check Point | Cyware Hacker News
Check Point’s Harmony Email team has reported a dramatic escalation in QR code phishing attacks (aka quishing), ...
Huawei, Vivo Phones Tag Google App as TrojanSMS-PA Malware
Huawei, Honor, and Vivo devices are displaying false security alerts urging the deletion of the Google app due to a ...
Attackers Can Use Modified Wikipedia Pages to Mount Redirection Attacks on Slack
Security researchers at eSentire are calling attention to a new method that attackers can use to redirect business ...
Pro-Hamas Hacktivists Targeting Israeli Entities with Wiper Malware
Oct 30, 2023NewsroomCyber War / Malware A pro-Hamas hacktivist group has been observed using a new Linux-based wiper ...
Toronto Public Library facing disruptions due to cyberattack
Canada’s largest public library system said it is dealing with a cyberattack that brought down its website, member ...
IoT security threats highlight the need for zero trust principles – Help Net Security
The high number of attacks on IoT devices represents a 400% increase in malware compared to the previous year, according ...