The Singapore Police Force (SPF) has announced the extradition of two men from Malaysia for their alleged involvement in a…
Security
Cybersecurity researchers have uncovered a disturbing trend in malware delivery tactics involving sophisticated social engineering techniques. These methods exploit user…
Guidehouse Inc., based in McLean, Virginia, and Nan McKay and Associates, headquartered in El Cajon, California, have agreed to pay…
VMware has released updates to address critical flaws impacting Cloud Foundation, vCenter Server, and vSphere ESXi that could be exploited…
Threat Actors (TAs) associated with the notorious MEDUSA ransomware have escalated their activities and have allegedly targeted two institutions in…
Cybersecurity researchers have uncovered a new malware campaign that targets publicly exposed Docket API endpoints with the aim of delivering…
Seventy percent of enterprises are prioritizing investment in SaaS security by establishing dedicated teams to secure SaaS applications, as part…
A US court has found a Nigerian national guilty of charges related to a US $1.5 million business email compromise…
This week on TCE Cyberwatch, we report on significant breaches affecting both prominent companies and universities, with thousands of individuals…
The on-again, off-again saga of BreachForums took another twist in recent days with the news that the data leak forum…
ASUS has shipped software updates to address a critical security flaw impacting its routers that could be exploited by malicious…
By Hoda Alkhzaimi The technological prowess of small nations is increasingly recognized as a significant driver of global economic power.…
With companies coming forward every day announcing impacts from their third-party cloud data storage vendor, the Snowflake data breach seems…
By: Abhilash R., Head of Cybersecurity at OQ Trading In a progressively digital world, small and medium sized enterprises (SMEs)…
Threat actors have been observed deploying a malware called NiceRAT to co-opt infected devices into a botnet. The attacks, which…
Legitimate-but-compromised websites are being used as a conduit to deliver a Windows backdoor dubbed BadSpace under the guise of fake…
Traditional application security practices are not effective in the modern DevOps world. When security scans are run only at the…
A cybersecurity checklist is essential for strengthening the security of both personal devices and corporate networks in today’s digital landscape.…
A new wave of cyberattacks targeting Android users in the Middle East has surfaced, with a focus on both Palestine…
A suspected China-nexus cyber espionage actor has been attributed as behind a prolonged attack against an unnamed organization located in…