Over a dozen malicious Android apps identified on the Google Play Store that have been collectively downloaded over 8 million…
Security
Ever wonder what happens in the digital world every time you blink? Here’s something wild – hackers launch about 2,200…
Malaysian minister Fahmi Fadzil has tabled two crucial pieces of legislation aimed at addressing the rising threats of online harassment…
Taiwanese entities in manufacturing, healthcare, and information technology sectors have become the target of a new campaign distributing the SmokeLoader…
Artificial Intelligence (AI) is no longer a far-off dream—it’s here, changing the way we live. From ordering coffee to diagnosing…
Zero days under attack, a new advisory from ‘Five Eyes’, thousands of ICS units left exposed, and mandatory MFA for…
A Russian cybercriminal wanted in the U.S. in connection with LockBit and Hive ransomware operations has been arrested by law…
ESET researchers analyze the first UEFI bootkit designed for Linux systems Source: Read More
ESET researchers make a discovery that signals a shift on the UEFI threat landscape and underscores the need for vigilance…
‘Tis the season to be wary – be on your guard and don’t let fraud ruin your shopping spree Source:…
A 59-year-old U.S. citizen who immigrated from the People’s Republic of China (PRC) has been sentenced to four years in…
The global e-commerce boom has brought unparalleled convenience for consumers and massive revenue streams for businesses. Yet, this growth has…
A major UK healthcare provider, Wirral University Teaching Hospital (WUTH), part of the NHS Foundation Trust, has fallen victim to…
Zyxel Firewalls have become a key target in recent cyberattacks, with attackers exploiting a critical vulnerability to deploy the dangerous…
Microsoft has addressed four security flaws impacting its artificial intelligence (AI), cloud, enterprise resource planning, and Partner Center offerings, including…
A British hospital is grappling with a major cyberattack that has crippled its IT systems and disrupted patient care. Read…
Cybersecurity researchers are warning about malicious email campaigns leveraging a phishing-as-a-service (PhaaS) toolkit called Rockstar 2FA with an aim to…
The lines between digital and physical realms increasingly blur. While this opens countless opportunities for businesses, it also brings numerous…
A recent Cyble ICS vulnerabilities report sheds light on several critical vulnerabilities in industrial control systems (ICS) from major vendors…
Riyadh, Saudi Arabia, November 29, 2024 – Cyble, among the world’s fastest-growing AI-powered cybersecurity companies, is proud to announce a…