Latest News
MIT Graduate Brothers Arrested for $25 Million Ethereum Heist
Two MIT graduates arrested for allegedly stealing $25 million in Ethereum through a sophisticated blockchain manipulation scheme. The DOJ…
Shadow IT: Personal GitHub Repos Expose Employee Cloud Secrets
Alerted by a recent discovery of employee personal GitHub repos exposing internal Azure and Red Hat secrets, this article dives into the…
IoT Cameras Exposed by Chainable Exploits, Millions Affected
A recent discovery of 4 security flaws in ThroughTek's Kalay platform leaves millions of IoT devices exposed. This article explores the…
Entangle Launches Mainnet Leveraging Omnichain Interoperability
Dubai, UAE, May 16, 2024 – Entangle, an interoperable data infrastructure layer, announces the successful launch of its Mainnet after…
Popular Cyber Crime Forum Breach Forums Seized by Police
In a major blow to cybercrime, Breach Forums, a notorious online marketplace for stolen data, has been seized by the FBI and Department of…
MITM Attacks Can Still Bypass FIDO2 Security, Researchers Warn
Is FIDO2 truly unbreachable? Recent research exposes a potential vulnerability where attackers could use MITM techniques to bypass FIDO2…
Android Malware Poses as WhatsApp, Instagram, Snapchat to Steal Data
Android Security Alert- Hackers are disguising malware as popular apps like Instagram and Snapchat to steal your login details. Learn how to…
DNS Tunneling Used for Stealthy Scans and Email Tracking
Hackers are hiding malicious messages in everyday internet traffic! Learn how DNS tunneling works and how to protect yourself from this sneaky…
Kaspersky Reveals Global Rise in APTs, Hacktivism and Targeted Attacks
Kaspersky's Global Research and Analysis Team (GReAT) has released its latest quarterly report (Q1 2024) on the advanced persistent threat…
Future of eCommerce: Emerging Technologies Shaping Online Retail in 2024
Top-notch stores are moving online as eCommerce continues to lead with breakthrough innovations that are transforming global business…
Cinterion Modem Vulnerabilities Leave IoT and Industrial Networks Exposed
Millions of IoT and industrial devices at risk! Critical vulnerabilities in Cinterion cellular modems allow remote attackers to take control.
Police Accessed Proton Mail User Data in Terrorism Probe
Encrypted email services like ProtonMail and Wire promise privacy, but can they guarantee anonymity? A recent case in Spain has users…