As Mr. Cooper works to investigate and contain the cyberattack, customers are stuck waiting to pay and struggling to access information.
Continue ReadingAttacks
Israel-Hamas Cyberwarfare
In the wake of the Hamas terrorist attacks, multiple cyberwarfare hacker groups from around the world are targeting Israeli digital infrastructure.
Continue ReadingCyber Attacks with Hamas & Israel
How Hamas uses cyber attacks to attack Israel and how Israel responds with cyber attacks of their own. Cyber attacks can play a role in fueling the conflict.
Continue ReadingJerusalem Post Cyberattacks
Avi Mayer, Editor-in-Chief of the Jerusalem Post, speaks to Jen Psaki about their website experiencing “sustained” and “coordinated” cyberattacks
Continue ReadingCyber Fraud Part Time Job Scam
Cyber Crime Police of Hyderabad registered a case based on the complaint lodged by a Hyderabad resident, alleging that he was duped of Rs 28 lakh.
Continue ReadingScam Targeting Medicare
Recent news reports have revealed that Medicare beneficiaries are being targeted in a scam related to a data breach.
Continue ReadingCyberattacks on Military,Parliament
The federal government has been dealing with a series of cyberattacks by a hacker group in India.
Continue ReadingAI Voice Cloning Cyber Scams
Cybersecurity expert John Young says seniors are the target of most cybersecurity scams, with AI voice cloning taking the top spot in scamming trends.
Continue ReadingPhilHealth Cyber Attack
PhilHealth, the Philippine Health Insurance Corporation, recently admitted that the personal data of some of its members was compromised in a cyber attack.
Continue ReadingMoney Muling Cybercrime
Money muling is a form of fraud that involves the illegal transfer of money from one person or business to another.
Continue ReadingKeyloggers Cybercrime
Keyloggers are malicious software programs that are used to capture keystrokes and other data entered by users on a computer or device.
Continue ReadingPhishing Cybercrime
Phishing is a type of cyber attack that tries to get information such as usernames, passwords, and credit card details by masquerading as a trusted entity.
Continue ReadingViruses and Worms
It is essential to understand viruses and worms, and the steps to protect your business and customers from them.
Continue Reading






