Talking about AI: Definitions Artificial Intelligence (AI) — AI refers to the simulation of human intelligence in machines, enabling them…
Security
Multiple state-sponsored hacking groups from Iran, North Korea, and Russia have been found leveraging the increasingly popular ClickFix social engineering…
Apple on Wednesday released security updates for iOS, iPadOS, macOS Sequoia, tvOS, and visionOS to address two security flaws that…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a security flaw impacting SonicWall Secure Mobile Access (SMA)…
A cybersecurity firm is buying access to underground crime forums to gather intelligence. Does that seem daft to you? And…
The Common Vulnerabilities and Exposures (CVE) Program is one of the most central programs in cybersecurity, so news that MITRE’s…
Cybersecurity researchers have detailed four different vulnerabilities in a core component of the Windows task scheduling service that could be…
Cheap Android smartphones manufactured by Chinese companies have been observed pre-installed with trojanized apps masquerading as WhatsApp and Telegram that…
By Associate Professor Dr. Sheeba Armoogum, University of Mauritius In 2025, the paradigms of human hacking are undergoing a substantial…
A data breach at insurance firm Lemonade left the details of thousands of drivers’ licenses exposed for 17 months. According…
Intro: Why hack in when you can log in? SaaS applications are the backbone of modern organizations, powering productivity and…
On April 14, 2025, 4Chan, the infamous anonymous image board, experienced downtime due to unexplained outages that left users frustrated…
Cybersecurity researchers have unearthed a new controller component associated with a known backdoor called BPFDoor as part of cyber attacks…
North Korean hackers sent more than 120,000 phishing emails to nearly 18,000 individuals over a three-month campaign that impersonated South…
Introduction Cyber threats targeting supply chains have become a growing concern for businesses across industries. As companies continue to expand…
Threat actors are leveraging an artificial intelligence (AI) powered presentation platform named Gamma in phishing attacks to direct unsuspecting users…
Google on Wednesday revealed that it suspended over 39.2 million advertiser accounts in 2024, with a majority of them identified…
The U.S. government funding for non-profit research giant MITRE to operate and maintain its Common Vulnerabilities and Exposures (CVE) program…
Academic institutions have a unique set of characteristics that makes them attractive to bad actors. What’s the right antidote to…
Cybersecurity researchers have disclosed a malicious package uploaded to the Python Package Index (PyPI) repository that’s designed to reroute trading…