The alarming Tata Technologies Ransomware, detailed in a regulatory filing by Tata Technologies, reveals that a notorious ransomware group has claimed an attack on the company. The Tata …
Threats & Attacks
-
-
VulnerabilitiesNews
Google Android Vulnerabilities Patched: 40+ Exploited Flaws Fixed in March 2025 Update
by Clement Brako Akomea 3 minutes readThe recent fixes for Google Android Vulnerabilities in the March 2025 update, detailed on Android’s official security bulletin, address over 40 vulnerabilities, including two actively exploited in the …
-
Malware
Rogue Malware – How Fake Software Tricks Users and Compromises Security
by Clement Brako Akomea 5 minutes readOver time, you’ve likely encountered various software prompts urging you to install updates or security tools that seem legitimate. However, many of these deceptive applications fall under the …
-
VulnerabilitiesNews
Palo Alto Firewall Vulnerability CVE-2025-0108 Exploited in the Wild
by Penelope Iroko 2 minutes readA critical Palo Alto Firewall Vulnerability has been confirmed to be under active exploitation. The security flaw tracked as CVE-2025-0108, allows unauthorized attackers to gain access to the …
-
Service providers in the cybercrime arena now offer you the option of ransomware as a service (RaaS), a model that simplifies launching attacks. By purchasing ransomware kits from …
-
Ransomware
Ransomware Demystified – How to Protect Yourself From Digital Extortion
by Clement Brako Akomea 5 minutes readMany individuals underestimate the threat of ransomware, believing it won’t happen to them. However, as cybercriminals become more sophisticated, you must understand how these attacks work and what …
-
NewsVulnerabilities
Microsoft Fixes Critical Windows Zero-Day Vulnerabilities in February Patch Update
by Penelope Iroko 2 minutes readMicrosoft has rolled out its latest Patch Tuesday security update, fixing multiple vulnerabilities, including two actively exploited zero-day vulnerabilities. The company has urged Windows users and administrators to …
-
There’s a growing threat in the cyber landscape known as InfoStealer malware, specifically designed to extract sensitive information from your systems. This type of malicious software targets personal, …
-
Malware
Understanding Malware – A Comprehensive Guide to Cyber Threats
by Clement Brako Akomea 6 minutes readThreats to your digital safety are constantly evolving, making it necessary for you to understand malware and its various forms. This comprehensive guide will arm you with the …
-
VulnerabilitiesNews
Apple Confirms USB Restricted Mode Exploited in ‘Extremely Sophisticated’ Attack
by CSC Newsby CSC News 2 minutes readApple has confirmed that an ‘extremely sophisticated’ Apple USB Restricted Mode exploit has been used in targeted attacks, potentially putting iPhone and iPad users at risk. Apple Issues …