Cybercriminals are exploiting Google Calendar and other Google services like Gmail, Forms, and Drawings in a large-scale phishing campaign, researchers from Check Point have reported. The campaign manipulates the trusted Google tools to bypass email security measures, allowing attackers to steal
Latest News
Florida Governor Ron DeSantis has signed legislation that would require residents of the state to verify their age to access social media and adult content. The bill, effective January 1, 2025, aims to protect minors from harmful online influences and combat addictive technology. Pornhub and a
Russia’s internet regulator, Roskomnadzor, has blocked the Viber messaging app, citing violations of national legislation while accusing the platform of facilitating terrorism, extremism, and drug trafficking. Viber, a platform owned by Japanese company Rakuten, has over 17 million daily users
Texas Tech University Health Sciences Center (TTUHSC) and its El Paso division have suffered a massive data breach impacting the personal information of over 1.4 million patients. The cyberattack, which occurred between September 17 and September 29, 2024, disrupted the university’s computer
Chinese authorities have been using an advanced spyware tool called “EagleMsgSpy” to monitor Android devices in China, according to a report by US-based cybersecurity firm Lookout. Operational since at least 2017, the spyware has been used by public security bureaus across China to gather vast
Meta's platforms — Facebook, Instagram, Threads, and WhatsApp — suffered a significant worldwide outage on December 11, 2024, starting at approximately 12:40 PM ET. Millions of users reported issues accessing the platforms through their websites and apps, with varying degrees of disruption
Hackers are targeting Web3 professionals with malware disguised as video conferencing apps, in an effort to steal cryptocurrency and sensitive data. The campaign, active since September 2024, primarily affects users on Windows and macOS. The attack revolves around a fraudulent meeting platform
Hackers are exploiting a critical vulnerability in Cleo’s file transfer software, impacting enterprises globally. The flaw, tracked as CVE-2024-50623, affects Cleo’s Harmony, VLTrader, and LexiCom products, widely used for managing secure data transfers. Cybersecurity firm Huntress revealed that
Cybersecurity Researcher, Jeremiah Fowler, discovered and reported to vpnMentor about a non-password-protected database that contained more than 4.8 million records belonging to Care1 — a Canadian company offering AI software solutions to support optometrists in delivering enhanced patient
Pegasus spyware, created by the Israeli firm NSO Group, has been identified on a growing number of smartphones worldwide. It targets individuals ranging from journalists and activists to business leaders and government officials. A report by mobile security company iVerify uncovered seven