How AI is Transforming Businesses

How AI is Transforming Businesses

While artificial intelligence (AI) is seen as a new phenomenon in mainstream society, it is not a new concept. As AI technologies increase, AI is becoming increasingly important for companies looking to stay competitive. What is AI Artificial intelligence is a broad...
Scammers Impersonating Refund Payment Portals

Scammers Impersonating Refund Payment Portals

The FBI warns about scammers pretending to be refund payment gateways from financial institutions to steal sensitive information from unsuspecting victims. The federal law enforcement agency stated that scammers deceive victims into granting them access to their...
Twitter’s Data Leak Exposes Over 5.4 Million Users

Twitter’s Data Leak Exposes Over 5.4 Million Users

Earlier this year, Twitter confirmed that an API vulnerability had caused a massive data leak containing non-public information for over 5.4 million Twitter users. Twitter denied claims that hackers had leaked the private information priorly. However, Pompompurin, the...
Phishing-as-a-Service on the Rise with Caffeine

Phishing-as-a-Service on the Rise with Caffeine

Threat actors may now launch their own sophisticated assaults thanks to the emergence of Phishing as a Service (PhaaS) platforms like “Caffeine.” Through an open registration procedure, anyone who wishes to launch their phishing campaign can sign up on...
Vice Society Claims Cincinnati State College Cyberattack

Vice Society Claims Cincinnati State College Cyberattack

Data allegedly stolen from Cincinnati State Technical and Community College has been leaked after Vice Society attacked the campus. Many of the stolen documents were posted on the hackers’ websites. These documents date from several years ago until November 24,...
Hackers Execute Arbitrary Code with Microsoft Office

Hackers Execute Arbitrary Code with Microsoft Office

According to cybersecurity experts at Cisco Talos, Microsoft Office has a high-severity vulnerability that could allow prospective cyber attackers to execute malicious code on the target device remotely. Microsoft announced the issue in a brief blog post, stating that...
Generated by Feedzy