HomeTechnologyCybersecurity

Cybersecurity

Malaysia’s Death Penalty and Section 302: A Transformative Era

Malaysia's death penalty laws, particularly Section 302 which mandates capital punishment for murder, have long been a subject of intense debate. Recent reforms have sparked a transformative era in the country's approach to sentencing and executions. These changes reflect shifting public opinions and growing...

Fraudulent CrowdStrike Manual Distributes New Infostealer Malware

CrowdStrike has issued a warning regarding a fraudulent recovery manual designed to repair Windows devices, which is distributing a new information-stealing malware known as Daolpu. Following a problematic update to CrowdStrike Falcon that caused widespread IT outages, cybercriminals have exploited the situation by sending...
spot_img

Keep exploring

Fraudulent CrowdStrike Manual Distributes New Infostealer Malware

CrowdStrike has issued a warning regarding a fraudulent recovery manual designed to repair Windows...

Von Der Leyen Vows To Combat Ransomware Attacks On EU Hospitals

Former European Commission President Ursula von der Leyen has committed to developing a strategy...

GhostEmperor Resurfaces: Chinese Hacking Group Spotted After Two Years

A previously elusive Chinese hacking group known as GhostEmperor has resurfaced after more than...

Eight Wartime Rules For “Civilian Hackers” And Four State Obligations To Restrain Them

As digital technology changes how militaries conduct war, a concerning trend has emerged in...

The hackers’ new method of demanding ransom payments

Software developer Veeam has found that cybercriminals are getting more ingenious with their ransomware...

China bans Micron chips from being used in important facilities, citing “national security” risks

China has stopped selling some Micron goods after opening an investigation into the American...

Study Finds Israeli Hacking Spyware

A Canadian watchdog said Tuesday that new Israeli-made spyware resembling the notorious Pegasus programme...

FBI: Don’t charge your phone in a public place

The FBI advises individuals to stop using public smartphone recharge stations due to malware...

Chinese government-backed hackers from Iron Tiger are making new malware for Linux devices

Chinese state-backed hackers APT27, commonly known as Iron Tiger, created SysUpdate, a Linux malware...

Google Reveals Russian Cyber Attacks on Ukraine

Russia's cyber attacks on Ukraine increased by 250% in 2022 compared to two years...

Apple Reports 3 New iPhone, iPad, and Mac Vulnerabilities

Apple has updated the security advisory it issued last month to add three new...

Chinese Hackers Use ShadowPad To Target South American Diplomatic Entities

Microsoft on Monday blamed a cyber espionage actor based in China for a series...

Latest articles

Malaysia’s Death Penalty and Section 302: A Transformative Era

Malaysia's death penalty laws, particularly Section 302 which mandates capital punishment for murder, have...

Fraudulent CrowdStrike Manual Distributes New Infostealer Malware

CrowdStrike has issued a warning regarding a fraudulent recovery manual designed to repair Windows...

Special Flight Launched To Repatriate Malaysians From Bangladesh

The AirAsia flight AK77, deployed to evacuate Malaysians from Bangladesh, safely landed at Hazrat...

Mysterious Chinese Hacking Group ‘Ghostemperor’ Resurfaces After Two Years

A secretive and highly elusive Chinese hacking group known as GhostEmperor, infamous for its...