Cybercriminals Using Telekopye Telegram Bot to Craft Phishing Scams on a Grand Scale
More details have emerged about a malicious Telegram bot called Telekopye that’s used by threat actors to pull off large-scale...
Windows-as-an-app is coming
My first computer was an IBM 360 mainframe. To use it, I relied on a 3270 terminal. From...
Tell Me Your Secrets Without Telling Me Your Secrets
The title of this article probably sounds like the caption to a meme. Instead, this is an actual...
Hamas-Linked Cyberattacks Using Rust-Powered SysJoker Backdoor Against Israel
Cybersecurity researchers have shed light on a Rust version of a cross-platform backdoor called SysJoker, which is assessed to...
HSBC mobile banking down for thousands across UK
The firm is investigating the problem, which comes on the busy shopping day Black Friday. Source:: BBC News...
Kubernetes Secrets of Fortune 500 Companies Exposed in Public Repositories
Cybersecurity researchers are warning of publicly exposed Kubernetes configuration secrets that could put organizations at risk of supply...
Digital advocacy group criticizes current scope of the EU AI Act
Digital Europe, an advocacy group that represents digital industries across the continent, has released a joint statement ahead...
India launches global repository of Digital Public Infrastructure
The Indian government on Friday launched the Global Digital Public Infrastructure Repository (GDPIR) to bring together resources and...
Could airports make hydrogen work as a fuel?
Hydrogen is being touted as a fuel for aircrafts, but handling it at airports will be challenging. Source::...
iPhone to Android: The ultimate switching guide
So, you’re ready to leave your iPhone for greener pastures — specifically, the bright green hue of Google’s...
Nvidia sued after video call mistake showed ‘stolen’ data
Car firm Valeo alleges the theft of its data was inadvertently revealed during a Microsoft Teams call. Source::...
Konni Group Using Russian-Language Malicious Word Docs in Latest Attacks
A new phishing attack has been observed leveraging a Russian-language Microsoft Word document to deliver malware capable of...
Alert: New WailingCrab Malware Loader Spreading via Shipping-Themed Emails
Delivery- and shipping-themed email messages are being used to deliver a sophisticated malware loader known as WailingCrab. “The malware...
6 Steps to Accelerate Cybersecurity Incident Response
Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals. But...
Mirai-based Botnet Exploiting Zero-Day Bugs in Routers and NVRs for Massive DDoS Attacks
An active malware campaign is leveraging two zero-day vulnerabilities with remote code execution (RCE) functionality to rope routers...
Consumer cyberthreats: predictions for 2024
In our previous summary of consumer predictions, we delved into tactics that we expected scammers and cybercriminals to...
North Korean Hackers Distribute Trojanized CyberLink Software in Supply Chain Attack
A North Korean state-sponsored threat actor tracked as Diamond Sleet is distributing a trojanized version of a legitimate application developed...
What is Contact Key Verification and how is it used?
Many business professionals require highly secure messaging solutions, particularly when they travel. Apple’s iMessage will soon offer a...
The electronic noses designed to prevent food poisoning
Tech firms have developed AI-powered sensors that can detect bacteria in food. Source:: BBC News – Technology
Chipmaker Broadcom completes $69bn deal to buy VMware
Green light from Beijing follows the meeting between Presidents Joe Biden and Xi Jinping in the US last...