Most Recent Articles
From Beach to Breach: How a Relaxed Mind Can Lead to Data Disasters
It’s that time of the year – summer, sun, relaxation and beach holidays and our hero Ben has just returned from not thinking about work for three weeks. Unfortunately, he’s not read this article full of post-holiday cybersecurity tips and he and his em…
US Authorities Seize ‘Rapper Bot’ Malware; Oregon Man Charged
Federal officials dismantled a massive botnet-for-hire operation linked to global cyberattacks and charged its alleged creator.
Alleged developer behind botnet-for-hire identified
The US Department of Justice (DoJ) announced this week that it has ch…
We’re teaming up with Ramon Ray to help you protect your small business
We created Bitdefender Ultimate Small Business Security because small businesses are the heart of the economy—and like all hearts, they deserve protection and care. Small businesses create jobs, spark new ideas, and keep local communities alive. But th…
Patch Your iPhones and Macs! Apple Tackles Critical Security Flaw with iOS 18.6.2, macOS Sequoia 15.6.1
Apple is rolling out emergency updates addressing an “extremely sophisticated” attack vector likely used in targeted attacks.
The out-of-band updates, rolled out to iPhone, iPad and Mac users worldwide, address a single security issue tagged as seriou…
Aussie ISP Provider iiNet Says Hackers Stole 280,000 Emails and Customer Info in Data Breach
Australian telecom operator TPG Telecom has confirmed a data breach affecting its iiNet brand, with hackers gaining access to an order management system using stolen employee credentials. The incident, discovered on August 16, follows a 2022 breach of …
What is AirTag Stalking and How Can You Protect Against It?
The coin-sized tracking devices created by Apple are a lifesaver when it comes to keeping track of keys, wallets, and even luggage when you’re travelling on a long-haul flight.
However, its small size, which makes it easily concealable alongside its t…
The SharePoint Hack – Lessons Learned From 400+ Servers Being Pwned
In this article we’re going to cover what happened with the latest SharePoint vulnerability, who the attackers were and why, the geopolitical ramifications, a reveal of another vulnerability in SharePoint’s sibling, Exchange Server, and what you can do…
Beware of Fake Law Firm Scams Offering to Recover Stolen Crypto Funds
Fraudsters are increasingly posing as lawyers or law firms to scam people who have already fallen victim to an earlier fraud. These fake lawyers claim they can help recover lost money, preying on individuals who are emotionally vulnerable and financial…