مقالات

مقالات
Weekly Security Overview (June 1 – June 7)

Last week, significant developments in the realm of information security were reported across various platforms. Recent articles highlighted the concerning…

مقالات
Cybercriminals Exploit Phony IT Support Calls to Compromise Corporate Systems, Google

A financially motivated group of hackers identified as UNC6040 has adopted a straightforward yet efficient strategy to execute breaches within…

مقالات
ICE Initiates Deportation Proceedings Against Australian Cybersecurity Offender “DR32”

The recent developments regarding David Kee Crees, an Australian citizen, have garnered attention within the cybersecurity community. Crees, who has…

مقالات
Emergence of New Supply Chain Malware Operation Targeting npm and PyPI Ecosystems Affects Millions Worldwide

Cybersecurity researchers have identified a significant supply chain attack targeting multiple packages associated with GlueStack, which has led to the…

مقالات
Federal Government’s Engagement with Artificial Intelligence Regulations

On Thursday, a testimony was presented before the House Committee on Oversight and Government Reform during a hearing focused on…

مقالات
Malicious Browser Extensions Compromise Security of Over 700 Users Throughout Latin America Since Early 2025

Cybersecurity researchers have identified an ongoing campaign targeting users in Brazil since the beginning of 2025. This campaign involves the…