Restoring Trust: Nobitex Urges Users to Update Wallet Addresses Nobitex, a prominent player in the world of cryptocurrency trading, recently faced a significant challenge when its platform experienced a major…
Cybersecurity
Ransomware attack hits Swiss government data
Ransomware Attack Hits Swiss Government Data: Lessons Learned from the Sarcoma Hackers In a recent cybersecurity breach, Sarcoma hackers managed to infiltrate the systems of Swiss contractor Radix, leading to…
Balancing security and usability in digital authentication
Balancing Security and Usability in Digital Authentication In the ever-changing landscape of digital authentication, finding the delicate equilibrium between security and usability is crucial for businesses looking to maintain customer…
Ahold Delhaize Breach Hits 2 Million with Data Theft A recent cyberattack on Ahold Delhaize has left 2 million customers compromised due to a data breach. The breach, which was…
“Missed Package?” Scam Fooling Thousands
“Missed Package?” Scam Fooling Thousands Thousands of Kiwis are falling victim to evolving package delivery scams exploiting busy inboxes with fake DHL and NZ Post emails. With the rise of…
Geopolitical Hacktivism: A Growing Threat to National Infrastructure In the midst of escalating tensions between Iran and Israel, a concerning trend has emerged in the digital realm: hacktivist attacks. These…
Cyber Command and Coast Guard establish task force for port cyber defence
Cyber Command and Coast Guard Join Forces to Safeguard Ports Against Cyber Threats In a groundbreaking move to enhance national security, the U.S. Cyber Command and the Coast Guard have…
Cybercrime in Africa: Turning research into justice and action
Cybercrime in Africa: Turning Research into Justice and Action In recent years, the African continent has witnessed a surge in cyber threats that are not only growing in complexity but…
New SparkKitty malware targets crypto wallets
Beware of the New SparkKitty Malware Targeting Crypto Wallets In the ever-evolving landscape of cybersecurity threats, a new player has emerged – SparkKitty malware. This Trojan is not your typical…
North Korea-linked hackers deploy fake Zoom malware to steal crypto
Beware: North Korea-Linked Hackers Use Fake Zoom Malware to Steal Crypto In a recent cybersecurity threat, the notorious North Korea-linked BlueNoroff hacking group has been identified as the mastermind behind…