Pavel Durov’s arrest will change the future of Telegram
An error of judgement or a voluntary act to reach an agreement with the authorities. These are the two most popular hypotheses as to why Pavel Durov chose to land…
OnePlus Open Apex Edition, the foldable smartphone without weaknesses
Elegant, abundant and innovative. These are the three words to describe the OnePlus Open Apex Edition, the Chinese company’s foldable in the new Crimson Shadow version. Beautiful to look at…
Data on the cloud has become the main targets of cyber attacks
In recent years, data on the cloud has become the main target of cyberattacks. This phenomenon has pushed spending on protecting this data to the top of all other cybersecurity…
Insights into the NHS cyberattack: an interview with Shobhit Gautam
Interview with Shobhit Gautam: Recently, NHS England confirmed a significant patient data breach managed by the pathology testing company Synnovis due to a ransomware attack. The cyber-criminal group Qilin has…
What is application security and why do you need it?
The exponential growth in the volume of applications being developed, distributed, and patched across networks has entered an era of heightened vulnerability. Cyber hackers are always looking for vulnerabilities and…
Zimperium uncovers sophisticated SMS stealer campaign: android-targeted malware enables corporate network and application infiltration
Over 105,000 Malware Samples Identified Key Findings: Over 95% are/were unknown and unavailable malware samples Malware hijacked OTP text messages across more than 600 global brands Approx. 4,000 samples contained…
Essential cybersecurity tools for your PC in 2024
Essential cybersecurity tools: As we enter the second half of 2024, it becomes increasingly evident that security is a part of our lives. From viruses masquerading as the most innocent…
Why companies are following the MaaS
Applications based on artificial intelligence may be more or less useful for end users; they have certainly become straightforward to develop thanks to what is referred to as MaaS or…
OTP Bots: what are they?
Have you heard of OTP Bots making the headlines lately? If not, keep reading. OTP bot, an abbreviation for “one-time password bot,” is a malicious program meticulously crafted to circumvent…
How to prevent data leaks on Android Apps
As the Android market continues to expand rapidly, with over 2.9 million apps in the Google Play Store, robust mobile app security has become crucial. While the convenience and functionality…