Most Recent Articles
‘Please Stay 8 Seconds…’: The TikTok Scam That’s Exploiting Kindness, and How to Stay Safe
Imagine you’re scrolling TikTok when a touching video pops up: an elderly man, cats in the background, hands trembling as he pleads, “Please stay 8 seconds so I don’t have to shut down my cat shelter.” He’s selling handmade slippers to raise funds for …
Lazarus Group Accused of Stealing $11 Million in Crypto from Taiwanese Exchange BitoPro
North Korean threat actors allegedly strike again, exploiting social engineering and cloud vulnerabilities to breach Taiwanese crypto exchange BitoPro.
Targeted breach disguised as routine operations
Taiwanese cryptocurrency exchange BitoPro disclos…
Florida Lottery Scam Alert: Don’t Fall for ‘You’ve Won’ Phone Calls
If you get a phone call claiming you’ve won the Florida Lottery, just hang up.
That’s what the Florida Lottery is urging people to do, as scam reports surge across the state.
How the Scam Works
According to a recent alert, scammers are impersonating…
Remote Control Support Update for Samsung devices
From Android version 15 and later, the remote control functionality through the Knox SDK is being restricted to devices that are managed through Android Enterprise enrollment through an EMM solution. This change is implemented to enhance the device sec…
Oxford City Council Hit by Cyberattack. Legacy Data of Election Workers Potentially Compromised
Oxford City Council has said it fell victim to a security breach over the weekend of 7–8 June, which may have compromised election workers’ personal data.
According to the council’s statement, automated systems detected an intruder within its digital …
ConnectUnwise: Threat actors abuse ConnectWise as builder for signed malware
Since March 2025 there has been a noticeable increase in infections and fake applications using validly signed ConnectWise samples. We reveal how bad signing practices allow threat actors to abuse this legitimate software to build and distribute their …
Russian Hackers Bypass Gmail 2FA in Complex Phishing and Social Engineering Attack
Hackers have waged a sophisticated social engineering and phishing campaign to target a high-profile researcher by exploiting a Gmail feature.
A suspected Russia-backed group, likely APT29 (Cozy Bear), has launched an advanced phishing operation again…
How to Perform a Monthly IoT Security Audit for Your Smart Home
Simple monthly checkups can keep your smart home secure and your data out of the wrong hands.
Nowadays, smart devices are available in almost every house. Not so long ago, the IoT ecosystem encompassed only a few household staples, like thermostats an…