A SIM Swap Scam or SIM Cloning Scam exploits a vulnerability in a two-factor authentication (2FA) system that relies on…
Anonymous claims a successful cyberattack against the Israeli Defence Force (IDF), gaining access to 20 gigabytes of data, which allegedly…
As Russia's invasion of Ukraine enters its third year, the formidable Sandworm (aka FROZENBARENTS, APT44) cyber threat group remains highly…
Authorities have dismantled LabHost, a notorious cybercrime platform that facilitated widespread phishing attacks across the globe. The crackdown on LabHost,…
DMARC is targeted by hackers as this serves to act as a preventative measure against email spoofing and phishing attempts. …
Hackers exfiltrate data first before encrypting it to increase their bargaining power during ransom negotiations. Threats of public exposure of…
Over the weekend, Iran launched missile and drone attacks on Israel, retaliating for a suspected Israeli strike on its Damascus…
Ahmed exploited a vulnerability in a decentralized cryptocurrency exchange's smart contract by injecting fabricated pricing data, which triggered the generation…
Cybersecurity researchers at Kaspersky have uncovered evidence that cybercriminal groups are customizing the virulent LockBit 3.0 ransomware for targeted attacks…
A comprehensive four-year study of brute-force attacks against SSH servers has revealed an alarming increase in the frequency and sophistication…