Skip to main content
  1. Home
  2. Cybersecurity

Cybersecurity

Jack Dorsey sits in front of a Twitter logo.

Breaking down the Twitter whistleblower allegations and how it affects the Musk takeover

You've probably heard of the Twitter Whistleblower by now. Let's take a look at some of the serious allegations in their complaint.
A digital depiction of a laptop being hacked by a hacker.

Hackers are using fake WordPress DDoS pages to launch malware

Hackers are pushing the distribution of dangerous malware via WordPress websites through bogus Cloudflare DDoS protection pages, a new report has found.
A depiction of a hacker breaking into a system via the use of code.

Google just thwarted the largest HTTPS DDoS attack in history

Google has confirmed that one of its cloud customers was targeted with the largest HTTPS distributed denial-of-service (DDoS) attack ever reported.
A digital encrypted lock with data multilayers.

Hackers could use this nasty bug to expose government websites

Cybersecurity researchers have reported that a vulnerability in the open-source control system Git has left government domains open to data breaches.
The Logitech Brio 4K Pro attached to a Macbook.

Zoom just fixed a major security flaw on Mac. Here’s why you should update now

Zoom spent the weekend patching a major security flaw in its Mac app, and the update is available right now.
A depiction of a hacker breaking into a system via the use of code.

Hacking-as-a-service lets hackers steal your data for just $10

A new (and cheap) service that offers hackers a straightforward method to set up a base where they manage their cyber crimes has been discovered.
A depiction of a hacker breaking into a system via the use of code.

Hackers have found a way to log into your Microsoft email account

Account holders for Microsoft email services are being targeted in a fresh phishing campaign, according to security researchers from Zscaler's ThreatLabz group.
The Wiseasy point of sale system on a table.

Hackers stole passwords from 140,000 payment terminals using malware

The Android-based payment system, Wiseasy, has experienced a data breach that has allowed hackers to gain control of thousands of its payment terminals.
A large monitor displaying a security hacking breach warning.

U.S. federal court system cyberattack is worse than previously thought

A cyberattack incident that involved the U.S. federal court system infrastructure has been proven to be an incredibly significant and sophisticated attack.
A depiction of a hacker breaking into a system via the use of code.

Europe just suffered its worst DDoS attack ever, but we don’t know why

A record-breaking distributed denial-of-service (DDoS) attack situated within Europe was attempted during July, a new report has confirmed.
A depiction of a hacked computer sitting in an office full of PCs.

Ransomware victims are refusing to pay — but is it working?

A new report has highlighted how ransomware payments to hackers have begun to slow down -- victims are opting to not cave in to demands from threat actors.
A dark mystery hand typing on a laptop computer at night.

A data breach can cost millions of dollars — and you might be paying it

A data breach can be disastrous for any company -- and not just in terms of data leaked. The cost of a data breach is now at an average of $4.4 million.
A depiction of a hacked computer sitting in an office full of PCs.

This anti-hacker group helps you escape ransomware for free

This week marks the sixth anniversary of the No More Ransom project, an initiative aimed at helping ransomware victims.
A depiction of a hacker breaking into a system via the use of code.

Hackers now exploit new vulnerabilities in just 15 minutes

Hackers are now ​​moving faster than ever when it comes to scanning vulnerability announcements from software vendors.
A Dell laptop with Windows 10 sitting on a desk.

The latest Windows update is causing major printer problems

Here's how you can maximize the workaround for the Microsoft glitch on the Windows 10 mid-July update.
A depiction of a hacker breaking into a system via the use of code.

You’ll never guess what hackers are using Microsoft Calculator for

Hackers have found an unusual and unconventional method to infect PCs with malware: distributing dangerous code with Windows Calculator.
Two windows laptops sit on a wooden table.

Windows 11 now stops brute force cyberattacks right in their tracks

Windows 11 now blocks brute force attacks with an Account Lockout Policy. Windows will automatically lock down accounts after 10 failed login attempts.
Cybersecurity is a constant battle.

Cyberattacks have nearly doubled since last year, report says

Cyberattacks have nearly doubled since the last year and the odds that you'll be affected are increasing rapidly.
A hacker inputting code into a system.

The world’s most sensitive data could be vulnerable to this new hack

Some of the world's most sensitive data could be vulnerable due to a new hack. Using a SATA cable, an attacker can extract data from air-gapped systems.
Hands on a laptop.

Stealthy malware shows why you shouldn’t open unknown emails

A threat intelligence team has just published a report on malware that arrives as an email attachment and remains undetected by most antivirus programs.
Man holds an iPhone 13 Pro with the iOS 16 logo on screen.

iOS 16’s new Lockdown Mode takes iPhone security to the max

Apple has introduced Lockdown Mode, a new optional layer of cybersecurity designed to protect people at risk of being targeted by mercenary software.
A depiction of a hacker breaking into a system via the use of code.

Hacker steals 1 billion people’s records in unprecedented data breach

A hacker has stated that he has successfully infiltrated a police database, from which he apparently obtained details of one billion Chinese citizens.
The Linksys Hydra 6 dual-band mesh WiFi 6 router.

Oh great, new malware lets hackers hijack your Wi-Fi router

A new report finds hackers are targeting home Wi-Fi routers to gain access to all your connected devices. 
A symbol of the Mozilla Firefox logo.

Websites are constantly tracking you — but Firefox has a fix

Firefox continues to bring improvements to its privacy protection, this time adding a feature that helps you avoid being tracked by various websites.
A depiction of a hacker breaking into a system via the use of code.

Hackers just launched the largest HTTPS DDoS attack in history

The largest ​​HTTPS distributed denial-of-service (DDoS) attack in history materialized last week, Cloudflare, which specializes in DDoS mitigation, confirmed.
A dark mystery hand typing on a laptop computer at night.

Hackers can now take over your computer through Microsoft Word

A new vulnerability in Microsoft Office could potentially allow an attacker to take control of your computer even if you didn't open any files.
Conti ransomware group logo.

Notorious ransomware gang Conti shuts down, but not for good

The well-known ransomware gang, Conti, has officially decided to shut down. However, the key members of the group aren't done with cybercrime.
A digital encrypted lock with data multilayers.

Websites may be logging your email and password without you knowing

A new study reveals that up to 3% of the world's top websites collect your inputs before you ever submit them. This includes emails and passwords.
Silhouette of male hand typing on laptop keyboard at night.

Ransomware gangs are evolving in new and dangerous ways

While digital technology is growing at a rapid pace, ransomware gangs and their methods continue to develop at an aggressive rate as well.
Window's new Microsoft Security Experts program works to protect users from cybercrime using.

Microsoft reveals new secret weapon against cybercrime

Microsoft has announced a new cyber security-based initiative that will allow companies to tap into the tech giant’s in-house security services and personnel.
A digital depiction of a laptop being hacked by a hacker.

This researcher just beat ransomware gangs at their own game

A security researcher has discovered key flaws pertaining to popular ransomware and malware, which could lead to groups rethinking their entire approach.
A Macbook Pro sits in the dark, illuminated by its own screen.

Researchers find new vulnerability with Apple Silicon chips

Researchers discovered a new vulnerability that could leak data to an attacker. Fortunately, it's pretty benign for now.
Hands on a laptop.

Cloudflare just stopped one of the largest DDoS attacks ever

Cloudflare managed to mitigate a massive 15.3 million request-per-second DDoS attack. It was one of the largest such attacks ever recorded.
A large monitor displaying a security hacking breach warning.

Homeland Security bug bounty reveals huge number of flaws

Participants of Homeland Security's first-ever bug bounty program, named Hack DHS, confirmed that they found a worrying amount of security bugs.