This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.
Category: Articles
Meta Issues Urgent Warning on FreeType Vulnerability (C...
Meta has issued an urgent alert about a critical vulnerability (CVE-2025-27363) in the FreeType library, which could allow remote ...
Due To Cyber Attacks, The Health Board Is Still "Vigila...
After The Cyber Attack, NHS Dumfries And Galloway Claims It Is Still "Vigilant" Even A Year Later.
Cyber - Threat Feathers Ruffled By The " Spearwing " R...
With 400 Victims And Astronomically Large Ransom Demands, The Organization Is Utilizing The Medusa Malware And Occupying Area Prev...
Apple Issues Third Emergency Patch in Three Months to A...
For the third time in as many months, Apple has released an urgent security update to patch a zero-day vulnerability that has alre...
Meta Warns of Exploited FreeType Vulnerability Affectin...
Meta has issued a security alert regarding a high-severity vulnerability in the FreeType open-source font rendering library, warni...
Ballista Botnet Targets Thousands of TP-Link Routers, P...
A new IoT botnet, Ballista, has been identified exploiting a critical vulnerability in TP-Link Archer routers, affecting thousands...
CISA and Microsoft Urge Immediate Action on Critical Wi...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Microsoft have issued urgent advisories regarding a critical ...
Apple Patches Critical WebKit Zero-Day Exploited in Tar...
Apple has rolled out a security update to fix a zero-day vulnerability (CVE-2025-24201) that was exploited in highly sophisticated...
Ballista Botnet Exploits TP-Link Archer Router Vulnerab...
A newly identified botnet campaign, dubbed Ballista, has been actively targeting unpatched TP-Link Archer routers, according to cy...
According To The Nigerian Government, Cybercrime Is Imp...
The Nigerian Government Has Stressed That Many Of The Cyber criminal Schemes That Operate In The Country Are Not Run By Nigerians.
Lee Newspaper Breach Credited To Quilin Cybercrime Ring...
The Criminal Outfit Known As Ransomware -As-A-Service (RaaS) Promises That It Would Release The Stolen Data In Two Days, But Stran...
Enhancing ICS Security: The Rise of Threat Modeling Fra...
As research into device and industrial control system (ICS) security advances, frameworks designed to help manufacturers identify ...