Tag: Cyber Threats


  • Singapore Launches Digital Defence Hub to Guard Critical Infrastructure

    Singapore Launches Digital Defence Hub to Guard Critical Infrastructure

    Singapore strengthens its digital shield with a new defence hub Singapore has established the Digital Defence Hub (DDH) within the Centre for Strategic Infocomm Technologies (CSIT) to tackle cyber threats targeting the nation’s critical infrastructure. The move signals a strategic shift toward a whole-of-government approach to cybersecurity, focusing on sophisticated cyber threat actors and advanced…

  • European Cybersecurity Month 2025 kicks off with focus on phishing threats

    European Cybersecurity Month 2025 kicks off with focus on phishing threats

    European Cybersecurity Month 2025: A Europe-wide push against phishing As Europe marks the 2025 edition of European Cybersecurity Month, authorities are sharpening their focus on phishing—the most common method attackers use to breach devices and data. Recent analyses indicate that about 60% of cyberattacks begin with phishing, using deceptive emails, texts, or fraudulent websites to…

  • Generative AI Attacks Are Growing: What Businesses Need to Know

    Generative AI Attacks Are Growing: What Businesses Need to Know

    The threat frontier is shifting toward generative AI New findings from research firm Gartner reveal that attacks centered on generative AI are expanding globally. In a recent survey, 62% of organizations reported experiencing at least one incident that leveraged generative AI to facilitate wrongdoing. The pattern crosses industries, geographies, and attack surfaces, signaling a need…

  • Urgent Warning: 28 Malicious Android Apps to Delete Now

    Urgent Warning: 28 Malicious Android Apps to Delete Now

    Urgent Warning for Android Users If you own an Android phone, it’s crucial to pay attention to recent revelations that could impact your privacy and financial security. A significant alert has been issued regarding 28 apps that are disguised as legitimate applications, but in reality, they are a front for malicious software. The Trojan Horse…

  • IT-Attackers Threaten to Publish Personal Data

    IT-Attackers Threaten to Publish Personal Data

    Overview of the IT Attack In a chilling development, a group of hackers has threatened to publish personal data obtained from a recent IT attack. This announcement has raised alarm bells among cybersecurity experts. According to IT security expert Karl Emil Nikka, the hackers made their intentions known via darknet forums, indicating a clear motive…

  • Understanding Homoglyph Phishing Attacks

    Understanding Homoglyph Phishing Attacks

    Introduction to Homoglyph Phishing Attacks In the realm of cybersecurity, phishing attacks have evolved significantly, and one of the latest tactics employed by cybercriminals is known as homoglyph phishing. This form of phishing exploits the similarities between characters from different scripts, effectively tricking users into believing that they are engaging with legitimate websites. Understanding and…

  • Cyber Scams Targeting Gamers Using Cheats

    Cyber Scams Targeting Gamers Using Cheats

    Understanding the Rising Threat In the evolving landscape of online gaming, a new danger lurks in the shadows: cyber scams specifically targeting gamers using cheats. Recent research by Israeli cybersecurity firm CyberArk Labs reveals a comprehensive campaign that has exploited the vulnerabilities of players eager to gain an unfair advantage in their games. This article…

  • PromptLock: The First AI-Powered Ransomware Virus

    PromptLock: The First AI-Powered Ransomware Virus

    The world of cybersecurity has marked a significant turning point with the emergence of PromptLock, the first-ever ransomware virus harnessing the power of artificial intelligence to execute its malicious activities. Discovered by experts at ESET Research Labs, this innovative malware poses a threat not only to Windows users but also extends its reach to systems…