
How to detect SSH brute force attacks and how to protect against them is an important topic in the cybersecurity field today. As more and more people use SSH to manage their

New Golang malware is using Telegram as a 'lever' to spread itself everywhere.

Network intrusion, data loss, downtime, etc. are all nightmares for network administrators and security staff. That is why IDS systems were born. Let's understand what IDS is

There have been many lessons learned from scams using deepfake technology.

The issue is common on new iPhone models like iPhone 15, 16, and iPhones running iOS 18.

Google warns users to be careful of 'disguised' VPN applications that spread malware.

After Telegram's policy changes, scam and hacker groups have massively moved to Discord and Signal platforms.

The scammer intentionally entered the wrong password, causing the user's account to be locked, then pretended to be a bank employee and tricked them into installing malware on the

New security vulnerability discovered on USB-C controller of iPhone 15 and 16, should users worry?

A video with the content 'losing hundreds of millions of dong after 5 seconds of scanning a QR code to transfer money' is causing concern, but experts say this is fake news.

Even experienced cybersecurity professionals fall victim to sophisticated phishing attacks.

The 'AIDS' floppy disk is credited as the world's first ransomware attack.

Bad guys have taken advantage of cyberspace and the trust of victims to deceive and lure them to Cambodia.

A new phishing attack can access Microsoft 365 accounts, even if the target has 2FA enabled.

Dubbed Magniber, this dangerous ransomware strain has been around for a while now, and is ranked among the most dangerous with its diverse infection capabilities.

This malware infects people looking to avoid paying for the product, steals their personal information, and turns their computers into cryptocurrency mining zombies.

Excel users need to be on guard as a newly discovered phishing campaign is targeting Microsoft's spreadsheet application.

A cybersecurity firm has discovered a huge number of Android apps containing malicious code (adware), a discovery that also raises big questions about how Google monitors its

There are two basic types of ransomware, but hackers also have many other ways to attack an information technology system.

Security experts can use decryption tools to unlock data infected with ransomware, but in reality it's not that simple.