Fake Windows 11 update that can steal your data
Lately, a fake windows 11 update has circulated the internet, which is risking the users’ safety. It is spreading malware that could steal a user’s personal information. The reason why…
Hellenic Post cyberattack, closes down entire Data Center
The cyberattacked started from a zero-day malware installed on a workstation A hacking group attacked the Hellenic Post and managed to shut down the central postal system in Greece for…
Hackers are using Cloud accounts for crypto mining
Hackers are using Cloud accounts for crypto mining according to Google, which has released a detailed report on the issue to warn users. The report, entitled ‘Threat Horizons’, is written…
EU outlines plans for Joint Cyber Unit
The European Commission recently unveiled plans to set up a Joint Cyber Unit for cybersecurity cooperation. The task force is a response to worsening worldwide cyber insecurity, with attacks continuing…
Ransomware- It Looks Like This
Cybercrime has seen a steady rise in recent years. Criminals have been using all means available to them to conduct cyberattacks and extort money out of business owners. One tool…
Understanding the CUPS Vulnerability: What’s important to know
Four vulnerabilities in the Common Unix Printing System (CUPS), a common printing utility in many Linux distributions, have been making waves online over the past week – mostly due to…
Facebook hacks: the latest risks
Facebook hacks: Without a doubt, today, most lives are centred online, and Facebook is among the few social media platforms that serve both personal and professional lives. However, as the…
Mastering application security: best practices to follow
Are your applications bulletproof against today’s sophisticated cyber threats? Engineers understand that robust application security is not optional—it’s critical. Effective security testing methodologies, specific strategies, and industry best practices can…
Insights into the NHS cyberattack: an interview with Shobhit Gautam
Interview with Shobhit Gautam: Recently, NHS England confirmed a significant patient data breach managed by the pathology testing company Synnovis due to a ransomware attack. The cyber-criminal group Qilin has…
What is application security and why do you need it?
The exponential growth in the volume of applications being developed, distributed, and patched across networks has entered an era of heightened vulnerability. Cyber hackers are always looking for vulnerabilities and…