Cyber criminals impersonating brands’ websites for phishing
American security agency Federal Bureau of Investigation (FBI) has reported that there is increased activity of cyber criminals impersonating popular...
American security agency Federal Bureau of Investigation (FBI) has reported that there is increased activity of cyber criminals impersonating popular...
Recorded Future’s intelligence powers manufacturing giant Toshiba’s advanced security strategy. Kenji Kojima, Senior Manager of Cyber Security Technology Center, Toshiba,...
On 20 August 2021, the Standing Committee of China’s National People’s Congress passed the “Personal Information Protection Law” (“PIPL”). This...
New Delhi: Congress leader Rahul Gandhi has said both China and Pakistan are together against India and may jointly hit out...
Published 11:01 AM, May 8, 2022 Jennifer Bachus, Senior Bureau Official and Principal Deputy Assistant Secretary for the Cyberspace and...
KYIV, Ukraine (AP) — On Ukraine’s battlefields, the simple act of powering up a cellphone can beckon a rain of...
Astute Analytica released a new market report on the Leuco Dye Market. The in-depth study of the industry includes inputs,...
India’s fintech startups have had a torrid 2022 as regulatory changes have coincided with a prolonged funding winter. Far from...
Threat actors could exploit drones for payload delivery, kinetic operations, and even diversion, experts warn. Original post at https://cybernews.com/security/drones-hack-airborne-cybersecurity-nightmare/ Once...
An unauthenticated remote attacker could exploit multiple high-severity vulnerabilities detected in Passwordstate, an online password management solution, to obtain plaintext...
[mc4wp_form id=”387″]
[mc4wp_form id=”387″]
Copyright © 2022 Cyber Affairs. All rights reserved.