Cybersecurity

Malicious PDF Files Flooding SMS Inboxes: How to Protect Your Data

A dangerous phishing campaign is currently targeting mobile users worldwide, delivering malicious PDF files through SMS messages. These PDFs are disguised as legitimate communications from...

Subaru’s Starlink System Vulnerability Exposes Millions of Vehicles to Remote Hacking

Researchers Sam Curry and Shubham Shah identified critical vulnerabilities in Subaru's Starlink-connected vehicles, particularly affecting the 2023 Subaru Impreza. These flaws allowed unauthorized individuals to...

Phishing Campaign Uses Fake CAPTCHA to Deliver Lumma Stealer Malware

Cybercriminals have unveiled a highly deceptive method of spreading the Lumma Stealer malware, leveraging counterfeit CAPTCHA verification pages to bypass user defenses and distribute...

The UK Areas Most at Risk of Online Shopping Scams

A new research has revealed the UK areas most at risk of online shopping scams this New Year, with Bedfordshire coming out on top. The...

Hackers Exploit Official Company Documents to Spread Malware

Cybercriminals have found a new way to exploit trust, using official company documents to trick users into downloading malware. This alarming discovery was unveiled by...

NordLayer Introduces Malware Detection Tool to Protect Businesses from Cyber Threats

NordLayer, a leading provider of secure remote access and encrypted connections, has unveiled a new feature called Download Protection. This tool is designed to...

T-Mobile Admits Chinese Hackers Accessed Network, But Call Logs Remain Safe

T-Mobile has confirmed that Chinese hackers recently targeted its infrastructure, but assured customers that no sensitive data, including call logs, was compromised. The incident, which...

Ford Denies Data Breach Allegations: Customer Information Secure

Ford Motor Company has firmly dismissed claims of a recent data breach, stating that its systems and customer data remain uncompromised. The alleged breach, which...