Ten years ago, ransomware actors mainly worked alone or in small groups, targeting home computer users through spam emails to…
Browsing: Threats and Vulnerabilities
A fresh wave of attacks tied to North Korea’s infamous Lazarus Group is targeting software developers through fraudulent job recruitment…
The global healthcare system has become increasingly integrated with third-party medical suppliers in recent years. These suppliers are vital in…
As governments, businesses, and organizations increasingly rely on digital systems, cyberattacks have become more systematic and widespread. These coordinated attacks…
Almost 80 years ago, George Orwell coined the phrase “Big Brother is watching you” in his dystopian thriller, 1984. Even…
Prevalent, a third-party risk management solutions provider, has partnered with Indigocube Security, a cybersecurity consultancy in SA. This collaboration aims…
Intellexa’s Predator spyware is back. After facing sanctions and exposure by the US government, the scourge appeared to decline. However,…
A newly discovered PyPI hijack technique called “Revival Hijack” has been exploited in the wild, posing a significant threat to…
The rise of AI presents both extraordinary opportunities and intimidating challenges in cybersecurity. While AI can easily identify and exploit…
The US Department of Justice has disrupted a covert Russian government-sponsored influence operation targeting audiences within its borders and other…