Ukrainian Telecom Under Attack by Russian Hackers

Cybersecurity experts have raised concerns over a suspected attack by Russian hackers on four Ukrainian telecom providers using AcidPour, a data-wiping malware that can disable embedded devices. A longer statement about the malware’s ability by Juan Andres Guerrero Saade and Tom Hegel revealed that “AcidPour’s expanded capabilities would enable it to better disable embedded devices including networking, IoT, […]

The Passcode Hacker Dilemma: Balancing Security and Convenience

Digitalization of our world has equipped smartphones and laptops with a wealth of personal and sensitive information, making it essential to ensure the security of our devices. One crucial aspect of device security is the passcode that grants access to our gadgets. However, as technology advances, so do the methods employed by hackers to bypass […]

The Passcode Hacker Dilemma: Balancing Security and Convenience

Digitalization of our world has equipped smartphones and laptops with a wealth of personal and sensitive information, making it essential to ensure the security of our devices. One crucial aspect of device security is the passcode that grants access to our gadgets. However, as technology advances, so do the methods employed by hackers to bypass […]

Unveiling Advanced Strategies Deployed by State-Sponsored Hackers Against Governments in the Middle East and Africa

According to Palo Alto Networks ‘ Cortex Threat Research team, government entities in the Middle East and Africa have recently faced persistent cyber-espionage attacks that utilize unique methods of credential theft and Exchange email exfiltration. These attacks, known as CL-STA-0043 (Cluster-State Backed Motivation), have been specifically aimed at obtaining sensitive and confidential information about political […]

Unveiling Advanced Strategies Deployed by State-Sponsored Hackers Against Governments in the Middle East and Africa

According to Palo Alto Networks ‘ Cortex Threat Research team, government entities in the Middle East and Africa have recently faced persistent cyber-espionage attacks that utilize unique methods of credential theft and Exchange email exfiltration. These attacks, known as CL-STA-0043 (Cluster-State Backed Motivation), have been specifically aimed at obtaining sensitive and confidential information about political […]