-
Posted On Uncategorized
Malicious Android Apps Pose as Google, Instagram, WhatsApp, Spread via Smishing
Malicious Android apps masquerading as Google, Instagram, Snapchat, WhatsApp, and X (formerly Twitter) have been observed to steal users’ credentials…
-
Posted On Uncategorized
What’s the Right EDR for You?
A guide to finding the right endpoint detection and response (EDR) solution for your business’ unique needs. Cybersecurity has become an ongoing…
-
Posted On Uncategorized
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Google on Thursday released security updates to address a zero-day flaw in Chrome that it said has been actively exploited…
-
Posted On Uncategorized
Social engineering: Definition, examples, and techniques
What is social engineering? Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain…
-
Posted On Uncategorized
Cyberattack Paralyzes 4 Quebec CEGEPs: Classes and Exams Cancelled
A recent Cégep de Lanaudière cyberattack has paralyzed the education system, causing classes to grind to a halt and prompting…
-
Posted On Uncategorized
🏴☠️ Lockbit3 has just published a new victim : colonialsd.org
https://mega.nz/folder/l60i2aLR#1pTmoxhVwJrSvVhJ1V3F5gWe are publishing sample partial (~50GB) from the data of Colonial School District. We have more 500GB available to sell.…
-
Posted On Uncategorized
LockBitSupp Denies Identification of Group ‘Admin’, Opens Contest to Find Named Dmitry Yuryevich
In an unexpected turn of events, LockBitSupp, the administrator of the notorious LockBit ransomware group, responded publicly to the Federal…