A newly revealed exploited Ivanti VPN vulnerability is putting over 5,000 internet-facing devices at serious risk, with evidence pointing to an active campaign by a sophisticated Chinese threat …
Threats & Attacks
-
-
NewsMalware
Elon Musk Energy Scam: Fake SMS Texts Trick US Users into Buying Phony Devices
by Clement Brako Akomea 1 minutes readHave you ever received a too-good-to-be-true text message? If it promised a “free energy-saving device from Elon Musk,” you might have just encountered the latest Elon Musk energy …
-
RansomwareNews
Tata Technologies Ransomware Attack: 1.4TB Data Leak Threat Revealed
by Clement Brako Akomea 3 minutes readThe alarming Tata Technologies Ransomware, detailed in a regulatory filing by Tata Technologies, reveals that a notorious ransomware group has claimed an attack on the company. The Tata …
-
VulnerabilitiesNews
Google Android Vulnerabilities Patched: 40+ Exploited Flaws Fixed in March 2025 Update
by Clement Brako Akomea 3 minutes readThe recent fixes for Google Android Vulnerabilities in the March 2025 update, detailed on Android’s official security bulletin, address over 40 vulnerabilities, including two actively exploited in the …
-
Malware
Rogue Malware – How Fake Software Tricks Users and Compromises Security
by Clement Brako Akomea 5 minutes readOver time, you’ve likely encountered various software prompts urging you to install updates or security tools that seem legitimate. However, many of these deceptive applications fall under the …
-
VulnerabilitiesNews
Palo Alto Firewall Vulnerability CVE-2025-0108 Exploited in the Wild
by Penelope Iroko 2 minutes readA critical Palo Alto Firewall Vulnerability has been confirmed to be under active exploitation. The security flaw tracked as CVE-2025-0108, allows unauthorized attackers to gain access to the …
-
Service providers in the cybercrime arena now offer you the option of ransomware as a service (RaaS), a model that simplifies launching attacks. By purchasing ransomware kits from …
-
Ransomware
Ransomware Demystified – How to Protect Yourself From Digital Extortion
by Clement Brako Akomea 5 minutes readMany individuals underestimate the threat of ransomware, believing it won’t happen to them. However, as cybercriminals become more sophisticated, you must understand how these attacks work and what …
-
NewsVulnerabilities
Microsoft Fixes Critical Windows Zero-Day Vulnerabilities in February Patch Update
by Penelope Iroko 2 minutes readMicrosoft has rolled out its latest Patch Tuesday security update, fixing multiple vulnerabilities, including two actively exploited zero-day vulnerabilities. The company has urged Windows users and administrators to …
-
There’s a growing threat in the cyber landscape known as InfoStealer malware, specifically designed to extract sensitive information from your systems. This type of malicious software targets personal, …