Global
-
The Top Ten Software Flaws Used By Cyber Criminals
Source: ZDNet / Danny Palmer February 04: Over half of the most common security vulnerabilities exploited by criminals to conduct cyber attacks and distribute malware are more than a year old, and […]
-
FTCode Ransomware Now Steals Saved Login Credentials
January 20: FTCode ransomware victims now have one more thing to worry about with the malware having been upgraded to also steal saved user credentials from email clients and web […]
-
This Citibank Phishing Scam Could Trick Many People
January 21: A new Citibank phishing scam is underway that utilizes a convincing domain name, TLS certs, and even requests OTP codes that could easily cause people to believe they […]
-
One In Four Countries Beset By Civil Strife As Global Unrest Soars
January 16: A quarter of all countries experienced a dramatic surge in civil unrest last year in a worrying trend that is likely to continue into 2020, researchers have found. […]
-
ICC 2019 Report: Unprecedented Number of Crew Kidnappings in the Gulf of Guinea
January 14: Despite overall piracy incidents declining in 2019, there was an alarming increase in crew kidnappings across the Gulf of Guinea, according to the International Chamber of Commerce’s International […]
-
Journalist Targets of Pegasus Spyware
November 06: Pegasus is a spyware created for mobile devices which transforms a cellphone into a mobile surveillance station. Researchers have documented it being used to spy on journalists. This raises […]
-
7.5 Million Records of Adobe Creative Cloud User Data Exposed
October 25: Adobe secured a database with 7.5 million records belonging to Adobe Creative Cloud users. The cache was not protected in any way, allowing anyone access to client information […]
-
Airports Rise to Technology Challenge Posed by Drone Threats
October 15: Airports worldwide still face complex and costly challenges in protecting their operations from the threat of disruption from drone flights, and there remains no “silver bullet” solution to […]
-
Chinese Hackers Use New Cryptojacking Tactics to Evade Detection
October 15: Chinese-speaking cybercrime group Rocke, known for operating multiple large-scale malicious crypto-mining campaigns, has now switched to new Tactics, Techniques, and Procedures (TTPs), including new C2 infrastructure and updated […]
-
ICC Report: Maritime Piracy Incidents Down in Q3, Yet Gulf of Guinea Remains a Hot Spot
October 15: The International Chamber of Commerce International Maritime Bureau’s (IMB) report for the third quarter of 2019 demonstrates fewer incidents of piracy and armed robbery against ships than the […]