HomeSecurity Architecture

Security Architecture

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom and access text messages, call logs, contacts, audio recordings, or even erase data.DroidLLock allows its operator to take complete control of the device via the VNC sharing system and can...

Hamas-Linked Hackers Probe Middle Eastern Diplomats

 A cyber threat group affiliated with Hamas has been conducting espionage across the Middle East."Wirte" — tracked by Palo Alto's Unit 42 as "Ashen Lepus" — has been spying on regional government bodies and diplomatic entities since 2018. Lately, it's been expanding its...
spot_img

Keep exploring

Cybercriminals have reportedly stolen nearly 100 employee logins from the Big Four banks, according to experts

Cybersecurity Alert: Employee Logins Stolen from Major Australian Banks In a concerning development, nearly 100...

Cyber Attack Attempt on BWSSB Water Connection Portal, Chairman Confirms No Sensitive Data Compromised

In an incident that raised concerns over cybersecurity measures in public utilities, an attempted...

Cybercrime: The Role of Accountants as the First Line of Defense

Cybersecurity: A Critical Concern for Finance and Accountancy Professionals Recently, Marks & Spencer (M&S) made...

Police Confirm Minimal Link Between SKT Hacking Incident and 50 Million Won Theft – CHOSUNBIZ

In a recent development, South Korean authorities have confirmed a minimal connection between a...

AI-Driven Cybercrime Threatens to Outpace Traditional Defenses, According to Check Point

The Rise of AI in Cybercrime: Insights from Check Point's Latest Report A recent report...

48-Hour Window: Cyber Threats and Scams Peak Around the Election – Microsoft

In the lead-up to the 2024 U.S. presidential election, Microsoft identified a significant escalation...

Cybercrime Surge Extends Beyond Bengaluru: Rural Karnataka Sees 1,600 Cases in 2024

Rising Cybercrime Threats in Rural Karnataka Cybercrime, historically viewed as a phenomenon restricted to urban...

Tennessee Police Now Allowed to Travel to Other States for Arrests

CHENNAI: A Significant Shift in Police Protocol for Cybercrime Investigations The 2017 film "Theeran Adhigaram...

AI and Automation Fuel Rise in Global Cyber Threats

Fortinet Unveils 2025 Global Threat Landscape Report: A Dire Warning for Cyber Defenses Fortinet, a...

Cybercrimes Surge in Rural Areas Over Two Years

In recent years, the surge in cybercrime cases across rural areas has come to...

Cybercriminals Exploit ATMs in WNC Using Sophisticated Jackpotting Schemes

Rising Crime: ATM Jackpotting in Western North Carolina FLETCHER, N.C. (WLOS) — A growing concern...

Survey Reveals 276 Million Adults at Risk of Cyber Threats from Apps and Quizzes – KXAN Austin

In recent years, the proliferation of mobile applications and online quizzes has significantly increased...

Latest articles

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...

Hamas-Linked Hackers Probe Middle Eastern Diplomats

 A cyber threat group affiliated with Hamas has been conducting espionage across the...

Why Lateral Movement Is Still the Cyber Threat You Shouldn’t Ignore

Most businesses treat breaches as perimeter problems — patch the firewall, update the...

How Global Tensions Shape the Attack Surface

Geopolitics as a core driver of cyber riskGeopolitics plays a decisive role in...