Destructive New Malware Hits Venezuela’s Energy Sector

Cybersecurity researchers at Kaspersky have uncovered a previously unknown data wiper malware, dubbed Lotus Wiper, that was used in a targeted destructive campaign...

Mozilla Firefox 150 Released with Fixes for Multiple Code Execution Vulnerabilities

Mozilla has recently released Firefox version 150, addressing a significant total of 41 security vulnerabilities. Among these flaws are multiple high-severity issues that have the potential to lead to remote code execution, a serious concern for users and administrators alike. Immediate action is encouraged...

Ransomware Negotiator Admits Guilt in Assisting BlackCat Attacks in 2023

In a significant development within the realm of cybercrime, a third individual has pleaded...

NFC Tap-to-Pay Vulnerable to Hackers

Cyber Criminals Exploit Trojanized Payment App to Steal NFC Data and Drain Accounts Cybercriminals are...

Destructive New Malware Hits Venezuela’s Energy Sector

Cybersecurity researchers at Kaspersky have uncovered a previously unknown data wiper malware, dubbed...

Mozilla Firefox 150 Released with Fixes for Multiple Code Execution Vulnerabilities

Mozilla has recently released Firefox version 150, addressing a significant total of 41 security...

Router Security Hardening Steps for 2026: Including Default Credential Audits and Automated Firmware Risk Monitoring

Network Edge Devices: The New Frontlines of Cybersecurity in the Netherlands In the rapidly evolving...

Destructive New Malware Hits Venezuela’s Energy Sector

Cybersecurity researchers at Kaspersky have uncovered a previously unknown data wiper malware, dubbed Lotus Wiper, that was used in a targeted destructive campaign...

Ransomware Negotiator Admits Guilt in Assisting BlackCat Attacks in 2023

In a significant development within the realm of cybercrime, a third individual has pleaded...

NFC Tap-to-Pay Vulnerable to Hackers

Cyber Criminals Exploit Trojanized Payment App to Steal NFC Data and Drain Accounts Cybercriminals are...

Ransomware Negotiator Admits Guilt in Assisting BlackCat Attacks in 2023

In a significant development within the realm of cybercrime, a third individual has pleaded...
spot_img

Cyber Balkans

Keeper Security Secures Minority Growth Equity Investment from Summit Partners

Cybersecurity firm Keeper Security has secured a significant minority investment from global growth equity...

What is a Passkey?

Passkeys continue their rise in popularity as an alternative form of user authentication that...

ProofPoint Report: Cybersecurity Stress Resurfaces Following a Brief Calm

A recent survey conducted by cybersecurity firm ProofPoint has revealed that 68% of Chief...

Methods for detecting PaperCut vulnerabilities are circumventable, and Iranian cyber attackers are now involved. A fresh breed of ransomware uses VPNs to penetrate its...

PaperCut vulnerability detection methods have recently been discovered to be easily bypassed, allowing hackers...

Advancements in AI Cybersecurity: Utilizing ChatGPT to Remain Ahead of Cyber Criminals

The field of cybersecurity has rapidly evolved in recent times as the world becomes...

Destructive New Malware Hits Venezuela’s Energy Sector

Cybersecurity researchers at Kaspersky have uncovered a previously unknown data wiper malware, dubbed...

Mozilla Firefox 150 Released with Fixes for Multiple Code Execution Vulnerabilities

Mozilla has recently released Firefox version 150, addressing a significant total of 41 security...

Router Security Hardening Steps for 2026: Including Default Credential Audits and Automated Firmware Risk Monitoring

Network Edge Devices: The New Frontlines of Cybersecurity in the Netherlands In the rapidly evolving...

Delilah Schwartz from Cybersixgill Talks About the Evolving Dark Web and New Threats from ChatGPT and Other AI Technologies.

Delilah Schwartz, a cyber threat analyst from Cybersixgill, has recently given an insightful interview...

What is a Passkey?

Passkeys continue their rise in popularity as an alternative form of user authentication that...

ProofPoint Report: Cybersecurity Stress Resurfaces Following a Brief Calm

A recent survey conducted by cybersecurity firm ProofPoint has revealed that 68% of Chief...

Salt Security collaborates with leading API testing experts in IT security

Salt Security has launched its Salt Technical Ecosystem Partner (STEP) program, aimed at helping...

Risk and Repeat: Are data extortion attacks equivalent to ransomware?

The threat landscape of ransomware has undergone significant changes, leading to a transformation in...

Keeper Security Secures Minority Growth Equity Investment from Summit Partners

Cybersecurity firm Keeper Security has secured a significant minority investment from global growth equity...

Malware

US OPM Health Insurance Data Collection Plan Raises Concerns

Data Privacy, Data Security, HIPAA/HITECH House Democrats...

Nokoyawa Ransomware Exploits Windows Zero Day Vulnerabilities

A report released by Kaspersky Labs recently shed light on a threat actor that...

PEGA Committee Advocates for Restrictions on Commercial Spyware

The European Parliament committee investigating the abuse of commercial spyware tools such as Pegasus...

Airbus Acquires Quarkslab to Combat AI Reverse Engineering

Airbus Expands Cybersecurity Initiatives with Acquisition of Quarkslab In a significant move to bolster its...

CISA Adds Eight Exploited Flaws to KEV and Establishes Federal Deadlines for April-May 2026

On Monday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) expanded its Known Exploited...
spot_img

RISK MANAGEMENTS

NFC Tap-to-Pay Vulnerable to Hackers

Cyber Criminals Exploit Trojanized Payment App to Steal NFC Data and Drain Accounts Cybercriminals are exploiting a trojanized Android payment application to engage in alarming...

Explaining the Difference between Symmetric and Asymmetric Encryption

Data is one of the most valuable assets for any organization today. The vast...

Router Security Hardening Steps for 2026: Including Default Credential Audits and Automated Firmware Risk Monitoring

Network Edge Devices: The New Frontlines of Cybersecurity in the Netherlands In the rapidly evolving...

Anthropic Invests in EPSS to Address Upcoming Surge in Bugs

Accelerating Vulnerability Management: Anthropic's Mythos and the Shift in Cybersecurity The introduction of Anthropic's Mythos has exacerbated a persistent issue in vulnerability management programs: the overwhelming number of vulnerabilities coupled with insufficient information on prioritizing which ones to address. Vulnerability management has always faced challenges,...

Gentlemen Ransomware Expands Through Rapid Affiliate Growth

Rising Threat: The Operations of The Gentlemen Ransomware Group A concerning trend in cybercrime has emerged with the rise of a ransomware-as-a-service (RaaS) operation known...

Cyber Architecture

Destructive New Malware Hits Venezuela’s Energy Sector

Cybersecurity researchers at Kaspersky have uncovered a previously unknown data wiper malware, dubbed...

Mozilla Firefox 150 Released with Fixes for Multiple Code Execution Vulnerabilities

Mozilla has recently released Firefox version 150, addressing a significant total of 41 security...

Vercel Confirms Cyber Incident According to Infosecurity Magazine

In a recent revelation, Vercel, the renowned developer tools and cloud infrastructure provider behind...

The Thin Gray Line: Handala, CyberAv3ngers and Iran’s Proxy Operations

Iran's cybersecurity landscape is a complex tapestry woven from decades of political turbulence, revolutionary...

20 Innovative AI and Security Products at RSAC 2026

At the recent RSAC 2026, the cybersecurity industry's major players and innovative startups converged to showcase a new range of tools designed to enhance the security of AI technologies and agents. The overarching theme of AI has dominated the conference for the past several...

All articles

Destructive New Malware Hits Venezuela’s Energy Sector

Cybersecurity researchers at Kaspersky have uncovered a previously unknown data wiper malware, dubbed...

Mozilla Firefox 150 Released with Fixes for Multiple Code Execution Vulnerabilities

Mozilla has recently released Firefox version 150, addressing a significant total of 41 security...

Ransomware Negotiator Admits Guilt in Assisting BlackCat Attacks in 2023

In a significant development within the realm of cybercrime, a third individual has pleaded...

NFC Tap-to-Pay Vulnerable to Hackers

Cyber Criminals Exploit Trojanized Payment App to Steal NFC Data and Drain Accounts Cybercriminals are...

Router Security Hardening Steps for 2026: Including Default Credential Audits and Automated Firmware Risk Monitoring

Network Edge Devices: The New Frontlines of Cybersecurity in the Netherlands In the rapidly evolving...

Ransomware Negotiator Admits Guilt in Association with BlackCat Cyber Gang

Former Ransomware Negotiator Admits to Collaborating with Cybercriminals in Major Extortion Scheme In a striking...

Poste Italiane Fined €12.5 Million for Data Violations

The Italian Data Protection Authority has levied substantial fines exceeding €12.5 million against Poste...

Vercel Confirms Security Incident Linked to Third-Party AI Tool in April 2026

Vercel Confirms Security Breach: Investigation Underway In a recent development, Vercel, a prominent cloud development...

Microsoft Alerts About Phony IT Worker Identities Breaching Cloud Environments

Microsoft has issued a serious warning regarding the North Korea-aligned group Jasper Sleet, which...

Anthropic Invests in EPSS to Address Upcoming Surge in Bugs

Accelerating Vulnerability Management: Anthropic's Mythos and the Shift in Cybersecurity The introduction of Anthropic's Mythos...

SystemBC C2 Infrastructure Exposes 1,570+ Victims in Ransomware Operations

Cybersecurity researchers revealed a large-scale compromise linked to the SystemBC malware infrastructure, uncovering...