Text-based fraud: from 419 scams to vishing
E-mail scammers typically combine social engineering with technical skills to bypass spam filters and persuade the recipient to reply. But...
E-mail scammers typically combine social engineering with technical skills to bypass spam filters and persuade the recipient to reply. But...
How to secure your private 5G networks; The challenge of complex ecosystem in DX. If you like the site, please...
In this blog entry, we discuss how open-source code has been subjected to protest-driven code modifications by its maintainers or...
The importance of proof of “security” concepts in private 5G networks: Are verifications of system operations and new functions sufficient...
Threat actors used a fake job offer on LinkedIn to target an employee at Axie Infinity that resulted in the theft...
A large-scale phishing campaign leveraging the Anubis Network is targeting Brazil and Portugal since March 2022. A large-scale phishing campaign...
If regulators have their way, data transfers from Facebook and Instagram between Europe and the United States could stop this...
BlackCat (aka ALPHV) Ransomware gang introduced an advanced search by stolen victim’s passwords, and confidential documents. The notorious cybercriminal syndicate...
Motherboard has disclosed some information about Operation Trojan Shield, in which the FBI intercepted messages from thousands of encrypted phones...
BleepingComputer reported a new ransomware operation named 0mega that is targeting organizations worldwide. 0mega is a new ransomware operation that...
Bad news for the owners of several Honda models, the Rolling-PWN Attack vulnerability can allow unlocking their vehicles. A team...
French virtual mobile telephone operator La Poste Mobile was hit by a ransomware attack that impacted administrative and management services. ...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs for...
Apple plans to introduce a security feature, called Lockdown Mode, to protect its users against “highly targeted cyberattacks.” The recent wave of...
Fortinet released security patches to address multiple High-Severity vulnerabilities in several products of the vendor. Fortinet addressed multiple vulnerabilities in...
Threat actors are exploiting the disclosed Follina Windows vulnerability to distribute the previously undocumented Rozena backdoor. Fortinet FortiGuard Labs researchers...
Cybereason researchers are warning of a wave of attacks spreading the wormable Windows malware Raspberry Robin. Raspberry Robin is a Windows...
Back in March, popular NFT battler Axie Infinity lay at the heart of a huge cryptocurrency theft inflicted on the...
Federal government organisations in Brazil may need to reassess their approach to cyberthreats, according to a new report by the...
Experts documented the evolution of the LockBit ransomware that leverages multiple techniques to infect targets and evade detection. The Cybereason Global...
Cisco fixed a critical vulnerability in the Cisco Expressway series and TelePresence Video Communication Server (VCS) products. Cisco released security...
Emsisoft has released a free decryption tool that allows victims of the AstraLocker and Yashma ransomware to recover their files...
This is a transcription of my complete interview with the program NEWSFEED at TRT, during which we discussed NGL software...
The operators behind the TrickBot malware are systematically targeting Ukraine since the beginning of the war in February 2022. IBM...