Scam Alert! Tea at Ritz London Leaves a Sour Aftertaste Among Diners
Diners visiting the popular Ritz hotel in London were left with a sour aftertaste as scammers posing as “extremely convincing” hotel staff stole their...
How to Leverage a Contact-free Authentication Solution for the Workforce
Employees face a challenge daily, actually multiple times per day, having to access multiple systems and applications throughout the day to do their job....
Real or Imposter? Everything You Need to Know About “Homoglyph” Phishing
Security experts from Malwarebytes discovered cybercriminals using a combination fake domains with favicons to launch “Homoglyph Attacks.” The attackers used Homoglyph attack — also...
97% Indian Organizations Experienced at Least One Business-Impacting Cyberattack in the Past 12 Months:...
The attacks on Indian organizations have increased in the past two years, yet only four in 10 security leaders in India have a clear...
Fake or Real? How to Spot Malicious or Fake Apps
Software applications are no more limited to smartphones; the app ecosystem has expanded from mobiles to watches, laptops, and television. Whether it is Google...
54% of Universities in the U.K. Suffered a Data Breach Last Year
A survey on the state of cybersecurity in the higher education sector, conducted by managed threat detection provider Redscan, revealed that nearly 54% of...
Blur or Focus? Malicious Photo Editing Apps Target Android Devices
The threat intelligence and research team from cybersecurity firm White Ops found a new campaign of malicious photo editing apps on the Google Play...
Cyber Risk Looming Over U.K. Sports Sector; Ransomware and BEC Attacks Common
The U.K.’s National Cyber Security Centre (NCSC) warned about the increasing cyber risks like phishing, ransomware attacks, and Business Email Compromise (BEC) schemes targeting...
BlackRock! A New Banking Trojan Debuts
Security researchers from ThreatFabric discovered a new banking Trojan "BlackRock," which is targeting Android banking apps and also stealing login credentials from social networking...
USB-Borne Malware Risks See a Twofold Increase Over 12 Months
A research from technology firm Honeywell revealed that the severity of USB threats to operational technology (OT) systems doubled over a 12-month period, with...













