Report reveals Twitter hackers lured employees to give up VPN credentials

The attackers that hacked Twitter in July pretended to call from Twitter’s IT department about a VPN issue, then persuaded employees to enter their credentials into a website that looked … Read More

Microsoft awards GHC2,245,800 in bounties to researchers for finding vulnerabilities in Azure Sphere

Since 2003, the month of October has been recognized as National Cybersecurity Awareness month and after a three-month research challenge which dovetailed into the beginning of October, Microsoft finally awarded GHC2,245,800 … Read More

Hackers breach mobile money system to steal billions from MTN, Airtel, others in Uganda

Unidentified hackers broke into the systems of Pegasus Technologies, a company that integrates mobile money transactions between telcos, banks, and other local, regional, and international money transfer services, making off … Read More

Malicious cyber actors are actively exploiting Zerologon Windows vulnerability – Microsoft warns

Microsoft warned on Thursday that malicious cyber actors have been exploiting the dangerous Zerologon vulnerability in Windows Server systems, which could allow an attacker to gain access to an organisation’s … Read More

Group of Hackers targeting Porn Site Users With Malicious Ads Redirecting To Exploit Kits, Malware

A cybercrime group has been busy over the past months placing malicious ads on adult-themed websites in order to redirect users to exploit kits and infect them with malware. Named Malsmoke, … Read More

Twitter has disclosed the discovery of a security bug on Android that left some private messages exposed to malicious actors

Twitter has disclosed the discovery of a security bug that impacted only a small percentage of users, according to a brief note detailing the matter. According to the company, it … Read More

New Security Flaw! – Attackers bypass multi-factor authentication to hijack email accounts

Researchers at Abnormal Security have detected an increase in business email compromise attacks that successfully compromise email accounts despite the use of multi-factor authentication (MFA) and Conditional Access. This is possible because … Read More