Google Rolling Out Privacy Sandbox Beta on Android 13 Devices

Google announced on Tuesday that it’s officially rolling out Privacy Sandbox on Android in beta to eligible mobile devices running Android 13. “The Privacy Sandbox Beta provides new APIs that are... Read more »

AdSense fraud campaign relies on 10,890 sites that were infected since September 2022

The threat actors behind a massive AdSense fraud campaign infected 10,890 WordPress sites since September 2022. In November 2022, researchers from security firm Sucuri reported to have tracked a surge... Read more »

Massive AdSense Fraud Campaign Uncovered – 10,000+ WordPress Sites Infected

The threat actors behind the black hat redirect malware campaign have scaled up their campaign to use more than 70 bogus domains mimicking URL shorteners and infected over 10,800 websites.... Read more »

Chinese Hackers Targeting South American Diplomatic Entities with ShadowPad

Microsoft on Monday attributed a China-based cyber espionage actor to a set of attacks targeting diplomatic entities in South America. The tech giant’s Security Intelligence team is tracking the... Read more »

Cybersecurity books on ransomware you shouldn’t miss

This list of ransomware-focused cybersecurity books is tailored for professionals seeking practical insights and deeper knowledge. Covering technical strategies, real-world cases, and the evolving tactics of attackers, these books... Read more »

Former CIA analyst pleaded guilty to leaking top-secret documents

A former CIA analyst, Asif William Rahman, pleaded guilty to leaking top-secret National Defense Information on social media in 2024. Asif William Rahman, a former CIA analyst with Top-Secret... Read more »

‘Sneaky Log’ Microsoft Spoofing Scheme Sidesteps Two-Factor Security

The phishing-as-a-service kit from Sneaky Log creates fake authentication pages to farm account information, including two-factor security codes. Read more »

New Mirai botnet variant Murdoc Botnet targets AVTECH IP cameras and Huawei HG532 routers

Researchers warn of a campaign exploiting AVTECH IP cameras and Huawei HG532 routers to create a Mirai botnet variant called Murdoc Botnet. Murdoc Botnet is a new Mirai botnet... Read more »

What is a private key?

Read more »

Entrust unveils AI-powered facial biometric authentication capability

Entrust introduced AI-powered identity verification as a new capability for its Identity-as-a-Service (IDaaS) platform. As cyber threats evolve and grow more sophisticated, businesses are facing escalating risks and financial... Read more »

Consilio Guided AI PrivDetect reduces privilege review time

Consilio launched Guided AI PrivDetect, a privilege detection solution that combines artificial intelligence and knowledge graph technology to accelerate and enhance the accuracy of privilege review. This solution, developed... Read more »

5 Best Endpoint Detection & Response Solutions for 2025

Endpoint detection and response (EDR) software is the best way to detect, investigate, and respond to advanced attacks. Endpoint detection and response software is a security solution that protects... Read more »

CERT-UA warned of scammers impersonating the agency using fake AnyDesk requests

CERT-UA warned of scammers impersonating the agency, using fake AnyDesk requests to conduct fraudulent security audits. The Computer Emergency Response Team of Ukraine (CERT-UA) warned of cyber scams involving... Read more »

Ransomware attackers are “vishing” organizations via Microsoft Teams

The “email bombing + posing as tech support via Microsoft Teams” combination is proving fruitful for two threat actors looking to deliver ransomware to organizations, and they seem to... Read more »
Subscribe to our Newsletter