Threat
Shielding the 2026 Winter Olympics: A Cybersecurity Race behind the Games
As the Milano-Cortina 2026 Winter Olympics unfold across Northern Italy, organizers are facing not just athletic competition, but a high-stakes battle against sophisticated cyber-attacks. Major international sporting events have historically been prime targets for cybercriminals — and with geopolitical tensions heightened in Europe, the digital defense strategy for these Olympic Winter Games has become a […]
Disgruntled Employees become easy targets for hackers to bypass Data Security controls
The threat posed by disgruntled employees has existed for decades, but in recent years it has taken on a far more dangerous dimension. With the rapid evolution of cybercrime tactics, hacking groups are increasingly exploiting internal dissatisfaction within organizations to bypass traditional data security controls. What was once considered a manageable human resources issue has […]
US CISA Deputy Director uploads sensitive office files to Microsoft owned ChatGPT
Whether done knowingly or inadvertently, the sharing of official documents with online platforms such as ChatGPT is widely regarded as a potential security risk. Any disclosure of internal data to a third-party service—especially one operated outside an organization’s direct control—can expose sensitive information and lead to privacy, compliance, or national security concerns for the data […]
Malware campaign exploits fear of Layoffs
For employees across the globe, the possibility of losing one’s job is a deeply unsettling fear. In an increasingly uncertain economic climate, news of layoffs can cause anxiety even among high-performing professionals. Cybercriminals are now exploiting this fear as a new tactic to spread malware, using deception and psychological pressure to trick unsuspecting employees into […]
Emerging Cyber Threat: Malware Now Targeting System Memory Instead of Disk Storage
Cyber criminals have long relied on traditional methods to distribute malware, typically placing malicious payloads on system storage devices like hard drives or solid-state drives (SSDs). However, recent findings from Morphisec Threat Labs reveal an alarming new trend in the way malware is being deployed. Instead of utilizing conventional disk-based distribution, attackers are now targeting […]
QR Code Phishing Attacks surge in 2025, targeting Mobile Devices: A Growing Cybersecurity Threat
In 2025, Kaspersky, a renowned cybersecurity firm, uncovered an alarming rise in QR code-based phishing attacks. These attacks have gained significant traction, particularly targeting mobile devices. The report highlighted a dramatic spike in phishing emails involving QR codes, with a staggering five-fold increase in such incidents between August and November 2025. The primary factor behind […]
Will Gmail Account Change raise Cyber Threat concerns for email users
Over the past few days, sections of the media have been speculating about a possible new feature from Google that could allow email users to change the domain name of their Gmail accounts. At present, Gmail addresses typically end with “@gmail.com,” but under this rumored change, users might be able to customize the domain portion […]
Study confirms AI-Generated NFC Malware has Emerged as a New Cyber Threat
Cybersecurity researchers at ESET have uncovered a troubling new trend in cybercrime: hackers are now using AI-generated malware to intercept payments made through Near Field Communication (NFC)-enabled devices. This advanced malware is capable of relaying sensitive payment card data, carrying out fraudulent online purchases, and even enabling unauthorized withdrawals from Automated Teller Machines (ATMs). The […]
Cyber Threat actors start recruiting insider threats from Telecom, banks and tech sector
According to recent findings from Check Point Research, a disturbing trend is emerging where state-sponsored hackers and other threat actors are actively recruiting insider threats from major companies in sectors such as telecommunications, banking, and technology. These cybercriminals are offering substantial financial incentives, ranging from $3,000 to $15,000, depending on the sensitivity and value of […]
Learn more about Ghost Pairing Cyber Attack via WhatsApp
A novel way of launching cyber attacks has emerged recently and is slowly, buy steadily taking on the western countries like UK and USA. It’s a WhatsApp based social engineering cyber attack dubbed as “Ghost Pairing” aimed at smart phone users by security experts. So, what exactly is Ghost Pairing? Ghost Pairing is a type […]














