Most Recent Articles
Europol targets Kremlin-backed cybercrime gang NoName057(16)
A pro-Kremlin cybercrime network has been taken offline after an international law enforcement operation disrupted over 100 of its servers, detained two gang members, and issued arrest warrants for seven more.
The hacking group NoName057(16) has been …
Easy Tasks, Real Money? The Hidden Danger Behind Task Scams
“Want to earn £200 a day from your phone?”
That’s the message flooding WhatsApp, Telegram, Instagram and even TikTok these days. What’s behind the claim? Just a regular ‘task scam’ that promises job seekers quick rewards. They offer users just enough …
Google Sues 25 in China Over Alleged BadBox 2.0 Botnet Operation
Google accuses 25 people in China of operating an extensive botnet that targets connected consumer devices.
IoT devices at the core of massive botnet
Google has filed a civil lawsuit against 25 unnamed individuals in China who allegedly operated the…
Microsoft Rolls Out Final Six-Month Security Extension for Legacy Exchange and Skype Users
Microsoft extends support through limited security updates to help legacy Exchange and Skype users finish their migrations.
Support deadline approaching
Microsoft has confirmed that Exchange Server 2016 and 2019, along with Skype for Business 2015 a…
Former US Soldier Who Bragged About Leaking Trump’s Call Logs Pleads Guilty to Hacking and Extortion Scheme
A former US Army soldier from Joint Base Lewis–McChord (JBLM) has pleaded guilty in Seattle to charges connected to a large-scale hacking and extortion operation targeting telecommunications companies.
21-year-old Cameron John Wagenius, who served at …
Adoption Agency’s Leaky Database Exposes Over 1.1 Million Sensitive Records
Security researcher Jeremiah Fowler has uncovered a leaky database affecting the Gladney Center for Adoption, a well-known nonprofit organization based in Texas.
The data exposure, discovered in June during a routine check, revealed over 1.1 million s…
Monthly Threat Report July 2025
Active exploitation of the Citrix Bleed 2 vulnerability has prompted emergency patch mandates, while Chinese state-backed attacks on Viasat and North American telecoms signal escalating geopolitical cyber threats. At the same time, breaches at Zoomcar …
11 Reasons Why You Need 3rd-Party Backup for Microsoft 365
This article will cover the key reasons why you need a proper backup strategy for M365. It will also demonstrate why and how Microsoft’s M365 Backup offering and built-in data governance / retention features can fall short in the real world.
The post …