Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a serious challenge to both enterprise and personal cybersecurity. Dubbed Anubis,...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to most, and often more meme than menace. Fast forward to 2025, and they’ve become fully weaponized, commercially available, and dangerously scalable. What began as clever video edits has become a...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...

Why IT Leaders Must Rethink Backup in the Age of Ransomware

 With IT outages and disruptions escalating, IT teams are shifting their focus beyond...

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a serious challenge to both enterprise and personal cybersecurity. Dubbed Anubis,...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...

Why IT Leaders Must Rethink Backup in the Age of Ransomware

 With IT outages and disruptions escalating, IT teams are shifting their focus beyond...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...
spot_img

Cyber Balkans

Keeper Security Secures Minority Growth Equity Investment from Summit Partners

Cybersecurity firm Keeper Security has secured a significant minority investment from global growth equity...

What is a Passkey?

Passkeys continue their rise in popularity as an alternative form of user authentication that...

ProofPoint Report: Cybersecurity Stress Resurfaces Following a Brief Calm

A recent survey conducted by cybersecurity firm ProofPoint has revealed that 68% of Chief...

Methods for detecting PaperCut vulnerabilities are circumventable, and Iranian cyber attackers are now involved. A fresh breed of ransomware uses VPNs to penetrate its...

PaperCut vulnerability detection methods have recently been discovered to be easily bypassed, allowing hackers...

Advancements in AI Cybersecurity: Utilizing ChatGPT to Remain Ahead of Cyber Criminals

The field of cybersecurity has rapidly evolved in recent times as the world becomes...

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...

Delilah Schwartz from Cybersixgill Talks About the Evolving Dark Web and New Threats from ChatGPT and Other AI Technologies.

Delilah Schwartz, a cyber threat analyst from Cybersixgill, has recently given an insightful interview...

Risk and Repeat: Are data extortion attacks equivalent to ransomware?

The threat landscape of ransomware has undergone significant changes, leading to a transformation in...

What is a Passkey?

Passkeys continue their rise in popularity as an alternative form of user authentication that...

Salt Security collaborates with leading API testing experts in IT security

Salt Security has launched its Salt Technical Ecosystem Partner (STEP) program, aimed at helping...

ProofPoint Report: Cybersecurity Stress Resurfaces Following a Brief Calm

A recent survey conducted by cybersecurity firm ProofPoint has revealed that 68% of Chief...

Keeper Security Secures Minority Growth Equity Investment from Summit Partners

Cybersecurity firm Keeper Security has secured a significant minority investment from global growth equity...

Malware

DragonForce Ransomware Linked to Marks and Spencer Digital Outage

Devastating Cyber Attack Strikes Marks & Spencer: Insights and Implications Almost a week ago, the well-known UK-based retailer, Marks & Spencer (M&S), encountered a severe cyber attack that sent its operations into full-blown disruption. Renowned for offering a diverse range of quality clothing, food, and...

Nokoyawa Ransomware Exploits Windows Zero Day Vulnerabilities

A report released by Kaspersky Labs recently shed light on a threat actor that...

PEGA Committee Advocates for Restrictions on Commercial Spyware

The European Parliament committee investigating the abuse of commercial spyware tools such as Pegasus...

Webinar: SD-WAN in the Age of SASE, AI, and Zero Trust—Still a Key Player?

Webinar Explores the Evolution of SD-WAN Amidst SASE, AI, and Zero Trust Frameworks In an...

Link11 Unites Three Brands on a Single Platform with Fresh Branding

Link11 Strengthens Its Position as a Top European Cybersecurity Provider Through Strategic Integration Frankfurt am...
spot_img

RISK MANAGEMENTS

Russian APT28 Hackers Increase Activity Amid Ukraine War, Reports French Security Agency

The ongoing conflict in Ukraine has led to a notable increase in cyber activities conducted by the infamous Russian hacking group known as APT28,...

Explaining the Difference between Symmetric and Asymmetric Encryption

Data is one of the most valuable assets for any organization today. The vast...

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

RansomHub Enhances Extortion Strategy Amidst Evolving RaaS Market

RansomHub’s Strategic Shift in the Ransomware Landscape In a notable development within the evolving ransomware ecosystem, RansomHub has refined its extortion model and expanded its affiliate recruitment efforts. This change comes at a time when significant volatility affects various Ransomware-as-a-Service (RaaS) operators. The recent law...

US House Passes Bill to Evaluate Threats from Foreign Routers

A significant move towards enhancing national security concerning communication infrastructure is underway with the recent passage of a new bill in the U.S. House...

Cyber Architecture

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

Kritische Zero-Day-Schwachstelle in SAP NetWeaver entdecken

Kritische Zero-Day-Sicherheitslücke in SAP NetWeaver Ausgenutzt Am 21. April 2025 wurde eine gravierende Zero-Day-Schwachstelle in...

Many Fuel Tank Monitoring Systems Vulnerable to Disruption, According to Source from Dark Reading

Many Fuel Tank Monitoring Systems Vulnerable to Disruption: A Rising Concern Recent discussions in the...

Police Confirm Minimal Link Between SKT Hacking Incident and 50 Million Won Theft – CHOSUNBIZ

In a recent development, South Korean authorities have confirmed a minimal connection between a hacking incident involving SK Telecom (SKT) and the theft of 50 million won. The investigation revealed that while both events involved cybercriminal activities, they were largely independent of each other. The...

All articles

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...

Why IT Leaders Must Rethink Backup in the Age of Ransomware

 With IT outages and disruptions escalating, IT teams are shifting their focus beyond...

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...

Why Business Impact Should Lead the Security Conversation

 Security teams face growing demands with more tools, more data, and higher expectations...

Securing Telecoms in the Age of AI and Critical Infrastructure

 As we reflect on World Telecommunication and Information Society Day (WTISD) 2025, marked...

The VPN You Shouldn’t Have Downloaded

Source : The Hacker NewsA sophisticated malware campaign has emerged, leveraging counterfeit VPN...

Even Resilient Organizations Are Blind to AI Threats

Organizations are underestimating the advanced technology's risks to the software supply chain, according...

Russian Hackers Target Western Firms Aiding Ukraine

 Russian Hackers Target Western Firms Aiding Ukraine By: G.K Date: May 21, 2025 Introduction: A Cyber...