This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.
Category: Articles
Personal Information Was Taken In A Council Cyber Attac...
The Number Of Residents Impacted By The Attack, Which Occurred In The Early Hours Of January 8, Is Unknown, According To Gateshead...
Over 100 Security Vulnerabilities in LTE and 5G Network...
A group of scholars has revealed more than 100 security flaws that affect LTE and 5G deployments.
Pwn2Own Contests See Several Hacks of Tesla Gear
This year's Pwn2Own Automotive hacking competition saw researchers successfully breach Tesla's electric vehicle (EV) charger with ...
Device settings are locked outside of trusted locations...
Google has introduced a new feature called Identity Check for supported Android devices, which enhances security by requiring biom...
Emerging Trends in Malware Research
Malware research has entered a transformative phase, driven by unprecedented technological complexity and evolving threat landscap...
Nigeria Police Cybercrime Unit Named Africa's Best By I...
The Interpol Cybercrime Directorate In Singapore Has Recognized The Nigeria Police Force ( N P F) As The Best Cybercrime Unit In A...
Numerous 'Vishing' and email bombing techniques are use...
Through Microsoft Office 365, Sophos X-Ops' Managed Detection and Response (MDR) is alerting users to ransomware attacks that use ...
Kenya Government Sets Taskforce To Evaluate The Compute...
To Conduct A Thorough Review And Audit Of The Computer Misuse And Cybercrime Act, The Government Established A Taskforce On The De...
DoNot Team Unveils Stealthy Android Malware: Targeted S...
The cyber threat actor known as the DoNot Team has been linked to a new strain of Android malware, discovered as part of highly ta...
Unveiling Sneaky 2FA: A Sophisticated Phishing Kit Targ...
Cybersecurity researchers have uncovered a new adversary-in-the-middle (AitM) phishing kit, named "Sneaky 2FA," designed to compro...
AWS Patches Critical Vulnerabilities in Amazon WorkSpac...
Amazon Web Services (AWS) has issued a security advisory for two critical vulnerabilities (CVE-2025-0500 and CVE-2025-0501) affect...
Google OAuth Vulnerability Exposes Millions of Accounts...
A critical flaw in Google’s OAuth authentication system allows hackers to take over accounts from former employees of failed start...