News

There are some things under the sun that can never be defended or glossed over.The desperation of the ruling ZANU PF regime ...
Microsoft’s Deputy CISO for Customer Security, Ann Johnson, talks about the need for having a proactive cyber resilience plan ...
AT&T customers are being warned to act fast after a trove of stolen data, containing up to 86 million customer records, ...
CISOs who have been through cyber attacks share some of the enduring lessons that have changed their approach to ...
Multiple legitimate, unusual tools were used in a Fog ransomware attack, including one employed by Chinese hacking group APT41.
U.S. Defense officials review the nuclear submarine agreement with Australia and the U.K., while Congress demands clearer ...
Fog ransomware hackers are using an uncommon toolset, which includes open-source pentesting utilities and a legitimate ...
INTERPOL and 26 countries dismantled 20,000+ malicious IPs tied to info-stealing malware, disrupting global cybercrime ...
Hackers are doubling down on software supply chain attacks, with known attacks surging from over 12 last year to more than 24 ...
Police Department held a press conference Monday after multiple local businesses filed reports related to phishing and malware attacks with law enforcement.
The initiative comes amid Nuh’s growing infamy as a national epicentre for cyber-related offences, officials said.