News
Falling for a phishing scam can feel like stepping on a rake-you won''t see it coming until it smacks you in the face.
20h
The Business & Financial Times on MSNFinancial Security (FinSec) series with Philip Takyi (PhD) : Inside the breachWhat Cyberattack reveals about telecom security in AfricaIn April 2025, MTN Group—Africa’s largest and most prominent telecommunications provider with operations spanning over 19 countries—faced a ...
Crypto thefts increasingly target human behaviour through social engineering schemes, instead of smart contract code vulnerabilities.
Scattered Spider isn't one group — it's an identity-first threat model evolving fast. From vishing to AiTM phishing, they're ...
Attackers use business email compromise to pretend to be company executives, vendors, or other trusted parties and trick ...
Cybersecurity researchers have warned of a new spear-phishing campaign that uses a legitimate remote access tool called ...
The Regional Court of Rostock has clarified who bears the risk of an incorrect transfer of an invoice in the event of ...
This research explores the changing landscape of cybercrime by focusing on three key areas: malware analysis, phishing attack analysis, and sentiment analysis. The study aims to identify malware ...
Google's Threat Intelligence Group revealed that a Chinese hacker group used Google Calendar to steal sensitive information.
Plus: An Iranian man pleads guilty to a Baltimore ransomware attack, Russia’s nuclear blueprints get leaked, a Texas sheriff ...
Security researchers flag two phishing campaigns abusing Firebase and Google Apps Script to host malware and fake login pages.
The UK’s Ministry of Defence has revealed that it was the target of a sophisticated, cyber attack that saw Russia-linked ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results