ANTIC has taken delivery of software and hardware worth around XAF735 million (US$1.3 million) to strengthen the country’s ...
Koi security researchers found that when NPM installs a dependency from a Git repository, configuration files such as a ...
Hackers are on the hunt for open telnet ports in servers after discovering that a version of legacy client-server application ...
The 11-year-old vulnerability likely impacts many devices that are no longer supported — and presents easy exploit even for ...
Modern ransomware has shifted from encryption to psychological extortion that exploits fear, liability, and exposure. Flare shows how today's ransomware groups weaponize stolen data and pressure ...
The hype around the exploits of centralized digital asset exchanges (CEX) and democratized digital asset exchanges (DEX) ...
Cameroon has reinforced its national cyber defence infrastructure by deploying advanced cybersecurity systems at the Computer ...
The US used a cyberattack to turn off power in Caracas during the raid to seize Maduro. The US grid is also vulnerable to ...
A drive-by download attack is a type of cyber threat where malicious software is downloaded and installed on a user’s device without their knowledge or consent simply by visiting a compromised or ...
In the first half of 2025 alone, AI agent creation surged by 119%, and IDC projects the number of actively deployed AI agents to exceed 1 billion worldwide by 2029 – 40x more than 2025. But all of ...
With AI moving into nearly all corners of life, criminal organizations and law enforcement are adopting new technologies to ...
The darkness that swept over the Venezuelan capital in the predawn hours of Jan. 3, 2026, signaled a profound shift in the ...