In a concerning development, a T-Mobile network intrusion threat has drawn attention to the rising dangers of cybersecurity breaches within major U.S. telecom providers. The company recently confirmed…
Penelope Iroko
-
-
News
Android SpyLoan Malware: Over 8 Million Users Targeted by Predatory Apps
by Penelope Iroko 2 minutes readThe alarming rise of Android SpyLoan Malware has left millions of users vulnerable to identity theft, financial fraud, and even extortion. New research from McAfee has uncovered 15…
-
NewsRansomware
Starbucks Payroll Disrupted by Blue Yonder Ransomware Attack
by Penelope Iroko 2 minutes readA major cyberattack has rocked the tech world, with the Blue Yonder ransomware attack causing widespread disruptions to Starbucks and other major retailers globally. The incident, which has…
-
NewsCloud SecurityData BreachesEcommerceIncident Response
Cloudflare Suffers Major Data Loss: 55% of User Data Compromised
by Penelope Iroko 2 minutes readCloudflare Suffers Major Data Loss: Imagine relying on a trusted service to safeguard your data, only to wake up to the news of a critical failure. That’s the…
-
NewsIoT Security
Matrix Botnet Launches Massive DDoS Attacks, Targeting Critical Infrastructure
by Penelope Iroko 2 minutes readA new wave of cyberattacks is putting the world’s critical infrastructure at risk as the Matrix botnet launches massive DDoS attacks on a global scale. These attacks exploit…
-
News
JumpCloud Attributes Security Breach to Sophisticated Nation-State Actor
by Penelope Iroko 1 minutes readJumpCloud Attributes Security Breach to Sophisticated Nation-State Actor: JumpCloud, an enterprise software firm, has revealed that a recent security breach targeting its customers was carried out by a…
-
News
WormGPT AI Tool Empowers Cybercriminals with Sophisticated Attack Capabilities
by Penelope Iroko 1 minutes readWormGPT AI Tool Empowers Cybercriminals with Sophisticated Attack Capabilities: Generative artificial intelligence (AI) has found a new application in the hands of cybercriminals, as a tool called WormGPT…
-
Cybercriminals Exploit Microsoft Word Vulnerabilities: Cybercriminals are leveraging vulnerabilities in Microsoft Word to distribute the LokiBot malware, a well-known Trojan that targets Windows systems and aims to steal…
-
Malicious USB Drives Target Global Organizations: The use of infected USB drives as a method for cyber-attacks has surged in the first half of 2023. Mandiant has uncovered…
-
News
Firefox 115 Release: Patching High-Severity Use-After-Free Vulnerabilities
by Penelope Iroko 1 minutes readMozilla has released Firefox 115, a stable channel update that includes patches for high-severity use-after-free vulnerabilities. These vulnerabilities pose potential risks to user security and the proper functioning…