News

A widespread campaign known as MacReaper has compromised more than 2,800 legitimate websites and infects Apple computers.
In today’s fast-evolving digital landscape, hacking is no longer a one-dimensional term tied only to cybercriminals. In ...
AI-powered cyber attacks are more sophisticated, harder to detect & capable of by-passing traditional security measures.
Cyberrey: Powering Africa’s cyber security future – one niche solution at a timeChampioning partner success, empowering enterprise resilience and transforming cyber security across Africa.Issued by ...
TeleMessage provides secure archiving services for a variety of messaging apps, including Telegram and WhatsApp. In this case ...
Supply chain vulnerabilities, hardware attacks, and communications hacks are rife. Autonomous technology poses extra threats.
In an era defined by rapid digital transformation and increasingly sophisticated cyber threats, two prominent voices in cybersecurity have joined forces: Aparna Achanta, Principal Security Architect ...
Plus: A DOGE operative’s laptop reportedly gets infected with malware, Grok AI is used to “undress” women on X, a school ...
The current approach to vulnerability management is rooted in its name: focusing on "vulnerabilities" (as defined by CVE, ...
In at least two of the attacks, those on Co-op and Marks and Spencer, the DragonForce group is confirmed to have used very ...
New York State's chief cybersecurity officer Colin Ahern says a convergence of serious threats calls for more coordinated ...
Rising tide of vulnerabilities requires fresh approaches to risk mitigation. A sound security foundation, broad asset ...