No menu items!
No menu items!
More

    News

    THN Recap: Top Cybersecurity Threats, Tools and Tips (Nov 25

    Dec 02, 2024Ravie LakshmananCyber Threats / Weekly Recap Ever wonder what happens in the digital world every time you blink? Here's something wild -...

    A Guide to Securing AI App Development: Join This Cybersecurity Webinar

    Dec 02, 2024The Hacker NewsAI Security / Data ProtectionArtificial Intelligence (AI) is no longer a far-off dream—it's here, changing the way we live....

    8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Play

    Dec 02, 2024Ravie LakshmananMobile Security / Financial Fraud Over a dozen malicious Android apps identified on the Google Play Store that have been collectively...

    INTERPOL Arrests 5,500 in Global Cybercrime Crackdown, Seizes Over $400 Million

    Dec 02, 2024Ravie LakshmananFinancial Fraud / Cryptocurrency A global law enforcement operation has led to the arrest of more than 5,500 suspects involved in...

    Wanted Russian Cybercriminal Linked to Hive and LockBit Ransomware Has Been Arrested

    Nov 30, 2024Mohit KumarRansomware / Cybercrime A Russian cybercriminal wanted in the U.S. in connection with LockBit and Hive ransomware operations has been arrested...

    AI-Powered Fake News Campaign Targets Western Support for Ukraine and U.S. Elections

    Nov 29, 2024Ravie LakshmananDisinformation / Artificial Intelligence A Moscow-based company sanctioned by the U.S. earlier this year has been linked to yet another influence...

    Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks

    Nov 29, 2024Ravie LakshmananAI Security / Cloud Security Microsoft has addressed four security flaws impacting its artificial intelligence (AI), cloud, enterprise resource planning, and...

    Phishing-as-a-Service “Rockstar 2FA” Targets Microsoft 365 Users with AiTM Attacks

    Nov 29, 2024Ravie LakshmananCybercrime / Cloud Security Cybersecurity researchers are warning about malicious email campaigns leveraging a phishing-as-a-service (PhaaS) toolkit called Rockstar 2FA with...

    Protecting Tomorrow’s World: Shaping the Cyber-Physical Future

    The lines between digital and physical realms increasingly blur. While this opens countless opportunities for businesses, it also brings numerous challenges. In our...

    Latest articles

    spot_imgspot_img