We’re Midway into 2024, and the threat landscape is evolving with new variants of viruses and malware that…
We’re Midway into 2024, and the threat landscape is evolving with new variants of viruses and malware that…
In our high-tech world, sneaky cyber threats can pop up anywhere. Lately, we’ve spotted sneaky malware on Android…
In the age of instant finance at our fingertips, loan apps have reshaped how we access funds. But…
“Humans are the weakest link in cybersecurity.” Data breaches worldwide prove this accurate, as human errors, lack of…
As we are about to enter the new year, it’s ritualistic to reflect on our experiences from the…
The recent news of Pegasus spyware attack via WhatsApp that targeted lawyers, journalists and human rights activists, offers…
Use of Phishing emails is not new for cyber-attack and is still one of the classic strategies to…
In the last few months, we’ve seen a sudden increase in Spear Phishing attacks. Spear phishing is a variation of…
In 2018, we saw a surge in Emotet activity. Emotet started as a banking trojan but this blog…
On the back of an upswing in Ransomware activity, we decided to carry out an in-depth analysis of…