This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.
Category: Articles
Emerging Trends in Malware Research
Malware research has entered a transformative phase, driven by unprecedented technological complexity and evolving threat landscap...
Nigeria Police Cybercrime Unit Named Africa's Best By I...
The Interpol Cybercrime Directorate In Singapore Has Recognized The Nigeria Police Force ( N P F) As The Best Cybercrime Unit In A...
Numerous 'Vishing' and email bombing techniques are use...
Through Microsoft Office 365, Sophos X-Ops' Managed Detection and Response (MDR) is alerting users to ransomware attacks that use ...
Kenya Government Sets Taskforce To Evaluate The Compute...
To Conduct A Thorough Review And Audit Of The Computer Misuse And Cybercrime Act, The Government Established A Taskforce On The De...
DoNot Team Unveils Stealthy Android Malware: Targeted S...
The cyber threat actor known as the DoNot Team has been linked to a new strain of Android malware, discovered as part of highly ta...
Unveiling Sneaky 2FA: A Sophisticated Phishing Kit Targ...
Cybersecurity researchers have uncovered a new adversary-in-the-middle (AitM) phishing kit, named "Sneaky 2FA," designed to compro...
AWS Patches Critical Vulnerabilities in Amazon WorkSpac...
Amazon Web Services (AWS) has issued a security advisory for two critical vulnerabilities (CVE-2025-0500 and CVE-2025-0501) affect...
Google OAuth Vulnerability Exposes Millions of Accounts...
A critical flaw in Google’s OAuth authentication system allows hackers to take over accounts from former employees of failed start...
Hackers Use Malware to Install 0bj3ctivity Stealer and ...
During different campaigns, threat actors have been seen delivering malware like VIP Keylogger and 0bj3ctivity Stealer by hiding d...
Ghanian Banks are Warned By ACDT About The Possibility ...
Following A Recent Worldwide Tech Failure, Ghana's Banks, Savings And Loan Organizations, And Rural banks Were Warned By The Afric...
Problems Found in the Rsync File Synchronization Tool b...
The well-known Rsync file-synchronization utility for Unix systems has up to six security flaws that have been revealed; some of t...
Hackers With Ties To Russia Use HATVIBE Malware To Targ...
An Ongoing Cyber Espionage Campaign Targeting Kazakhstan As Part Of The Kremlin's Aim To Obtain Political And Economic Intelligen...