Cyber Security

Researchers Undermine ‘Windows Hello’ on Lenovo, Dell, Surface Pro PCs

Researchers have figured out how to compromise three of the most common fingerprint readers used by today's PCs.With support from Microsoft, analysts from...

Stealth Falcon preying over Middle Eastern skies with Deadglyph

For years, the Middle East has maintained its reputation as a fertile ground for advanced persistent threats (APTs). In...

New botnet malware exploits two zero-days to infect NVRs and routers

A new Mirai-based malware botnet named 'InfectedSlurs' has been exploiting two zero-day remote code execution (RCE) vulnerabilities to infect routers and video recorder...

6 Steps to Accelerate Cybersecurity Incident Response

Modern security tools continue to improve in their ability to defend organizations' networks and endpoints against cybercriminals. But the bad actors still occasionally...

Qatar Cyber Agency Runs National Cyber Drills

Qatar's National Cyber Security Agency (NCSA) is testing the security postures of some 170 key organizations with a series of cyber drills.The tests...

Your voice is my password – the risks of AI-driven voice cloning

Digital Security AI-driven voice cloning can make things far too easy for...

$9 million seized from “pig butchering” scammers who preyed on lonely hearts

US authorities have seized almost $9 million worth of cryptocurrency linked to a gang engaged in cryptocurrency investment fraud and romance scams. The US...

Latest articles