Attackers have gained unauthorised access to user data at digital banking app developer Dave, with details of more than 7.5 million customers reportedly published on a hackers’ […]
Attackers have gained unauthorised access to user data at digital banking app developer Dave, with details of more than 7.5 million customers reportedly published on a hackers’ […]
Hackers intercepting high-profile Twitter accounts claim they gained direct access to the internal systems via a Twitter employee, Motherboard reports. It is reported that numerous accounts including […]
Cybersecurity firm Gemini has warned that Keeper Magecart is likely to continue launching increasingly sophisticated attacks against online merchants across the world. The assertion is based on […]
A previously unknown phishing technique has compromised the websites of more than 20 retailers in Europe and Americas, according to Kaspersky researchers. Rather than the traditional method […]
Protecting intellectual property (IP) is critical to business survival. It’s what sets companies apart from their competition, framing the business, its purpose and growth potential. While losing […]
Cyber criminals often exploit fear and uncertainty during major world events by launching cyberattacks. These attacks are often performed with social engineering campaigns leveraging malicious emails that lure victims […]
A new study published by Check Point Research suggests that malicious online actors are using the coronavirus to boost their own hacking campaigns, reports reveal. According to […]
Researchers have uncovered a new campaign whereby attackers are “trojanizing” multiple hacking tools. Cybereason researcher Amit Serper has been investigating a widespread hacking campaign that has been […]
Finnish cybersecurity firm F-Secure released its Attack Landscape H2 2019 report and in it, included some of the first passwords that hackers use when try to hack a device. […]
Instead of blocking hackers, a new cybersecurity defense approach developed by University of Texas at Dallas computer scientists actually welcomes them. The method, called DEEP-Dig (DEcEPtion DIGging), ushers intruders into a […]
Feel free to contact us. We are happy to assist you creating your digital vision.
Recent Comments