Scammers continue to evolve using different tricks to buy your domain name via a FAKE bitpolonie.com crypto exchange.

The adaptation of crypto currencies for payments are now being recognized around the world. It is an excellent innovation to

Read more

US and UK Expose New Malware Used by MuddyWater Hackers

This is expected as we continue to see the ongoing conflict between Russia and Ukraine. “US and UK cybersecurity and

Read more

Killware: The Most Dangerous Evolution of Ransomware?

2021 was filled with high-profile ransomware attacks on businesses across industries — some of which (e.g., the Colonial Pipeline attack)

Read more

We Can Neither Regulate Nor Sanction Away Cryptocurrency’s Facilitation of Ransomware

Interesting article from ISACA. If you are interested to learn what happen to the Colonial pipeline ransomware attack. This is

Read more

New zero-day in the Log4j Java library is already being exploited

A newly discovered zero-day vulnerability in the widely used Java logging library Apache Log4j is easy to exploit and enables

Read more

Hackers grab Social Security numbers from California Pizza Kitchen

California Pizza Kitchen (CPK) has revealed a data breach that exposed the Social Security numbers of more than 100,000 current

Read more

Robinhood breach affects 7M-plus users

Trading platform Robinhood said Monday that personal information for more than 7 million customers was accessed during a data breach

Read more

Ransomware Gangs Are Complaining That Other Crooks Are Stealing Their Ransoms

Cyber criminals using a ransomware-as-a-service scheme have been spotted complaining that the group they rent the malware from could be

Read more

New Malware Uses Windows Subsystem for Linux for Stealthy Attacks

Security researchers have discovered malicious Linux binaries created for the Windows Subsystem for Linux (WSL), indicating that hackers are trying

Read more