News

The Qilin ransomware operation has recently joined attacks exploiting two Fortinet vulnerabilities that allow bypassing ...
Several popular Chrome extensions send sensitive user data over unencrypted HTTP, exposing millions to interception and ...
However, the malware is used to steal a wide variety of credentials that are used in any and all kinds of infosec crimes, such as ransomware attacks, business email compromise (BEC) fraud, cyber ...
The digital landscape has evolved dramatically in 2025, with social media platforms becoming increasingly central to both ...
What is the current situation with nation-state cyber attacks in the middle of 2025? Here’s a look at some of the biggest ...
Cyber crime cases, which includes mainly the Phishing attacks and many other attacks in the prevailing COVID -19 situation, have reached an alarming rate with the outburst of numerous forms of crime.
The attackers can exploit this information to steal business records, launch ransomware attacks, and even commit corporate espionage. Attacks against state and government agencies – Fowler also ...
This post summarizes the CISA advisory issued on May 21, 2025 and offers some additional recommendations from Reveal Security based on similar and recently observed attack patterns ... advisory ...
The disruption being caused by the wave of cyber attacks on UK retailers has been apparent for weeks. Empty shelves, cancelled online orders, the data of millions of customers stolen. What has ...
Starting May 15, the Netherlands has introduced a new law that broadens the definition of espionage and introduces stricter penalties for cyber-related offenses. The Dutch Espionage law is aimed at ...