Cybercrime

Are QR Codes the New Frontier for Cybercrime?
Endpoint & Device Security Are QR Codes the New Frontier for Cybercrime?

As society becomes increasingly reliant on technology, QR codes have swiftly embedded themselves into everyday life, bringing both convenience and growing trepidations. Could a simple scan of a QR code unravel your digital security? The Hidden Threat Behind QR Codes The Anti-Phishing Working Group

UK Faces Urgent Need for Updated Cyberattack Legislation
Infrastructure & Network Security UK Faces Urgent Need for Updated Cyberattack Legislation

In today's digital landscape, cyberattacks and undersea cable sabotage increasingly threaten global stability and national security. The UK is at a pivotal point in addressing these threats through updated legislation. This article analyzes current market trends, evaluates data, and makes

ZuRu Malware Targets macOS Users with Trojanized Termius App
Endpoint & Device Security ZuRu Malware Targets macOS Users with Trojanized Termius App

Could your trusted apps be silently compromising your system security? Trusted applications, like the widely-used Termius app for managing SSH clients and servers, are an essential component of daily digital interactions. However, the recent discovery of a trojanized version exploits this trust,

Ahold Delhaize Cyberattack Exposes Data of 2 Million Plus Individuals
Data Protection & Privacy Ahold Delhaize Cyberattack Exposes Data of 2 Million Plus Individuals

What would you do if your most sensitive data—your Social Security number, health records, and bank account details—fell into the wrong hands? This alarming situation has become a reality for over 2 million individuals affected by a recent significant cyberattack on Ahold Delhaize USA. The company,

Ransomware Disrupts Ingram Micro's Operations Amid Probe
Malware & Threats Ransomware Disrupts Ingram Micro's Operations Amid Probe

In recent times, a new adversary has crept into the landscapes where businesses navigate—the ransomware attacker. Even the giants of the technological world find themselves not immune as they grapple with breaches that disrupt their operational rhythm. Technology powerhouse Ingram Micro stands as

Trojanized SonicWall VPN App Steals Users' Sensitive Data
Identity & Access Management Trojanized SonicWall VPN App Steals Users' Sensitive Data

In the ever-persistent battle against cybercrime, a recent incident has once again spotlighted the vulnerabilities faced by software users worldwide. Attackers have successfully tampered with SonicWall's NetExtender VPN application to craft a trojanized version that stealthily siphons off sensitive

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later