Skip to content

Nexus Android banking trojan targets 450 financial apps

An Android banking trojan named Nexus is being used by multiple threat actors to target 450 financial applications, cybersecurity firm Cleafy has warned. The malware appears to still be in its early stages of development, but it offers several features to perform account takeover (ATO) attacks against banking portals and cryptocurrency services, such as credentials… 

How Companion Viruses Work And How To Protect Your System

How Companion Viruses Work And How To Protect Your System The prevalence of cyber attacks has been increasing steadily in recent years, making it more important than ever to protect your system from malicious threats. One such threat is the companion virus – a type of malware that can wreak havoc on digital systems and… 

Cyber Security Vs Information Security

Cyber Security Vs Information Security In the current era of technology, data holds great value, making cybersecurity and information protection vital topics. With the continuous evolution of technology, there is also an increase in the risks posed by malicious individuals trying to access our sensitive data. While cyber security and information security are often used… 

What’s A Cyber Security Audit Vs A Cyber Security Assessment?

What’s A Cyber Security Audit Vs A Cyber Security Assessment? In today’s modern era, cyber security is an ever-increasing worry. As technology progresses, so do the dangers of cyber attacks and breaches, which can jeopardize our personal data. It is crucial to comprehend the differences between cyber security audits and assessments in order to safeguard… 

How to Detect New Threats via Suspicious Activities

How to Detect New Threats via Suspicious Activities Unknown malware presents a significant cybersecurity threat and can cause serious damage to organizations and individuals alike. When left undetected, malicious code can gain access to confidential information, corrupt data, and allow attackers to gain control of systems. To avoid these damaging circumstances, it is important to… 

Investigation Reveals Serious Data Safety Label Loopholes in Google Play Store

Investigation Reveals Serious Data Safety Label Loopholes in Google Play Store A recent investigation conducted by the Mozilla Foundation under its “Privacy Not Included” initiative has exposed the existence of serious loopholes in data safety labels of Android apps available on the Google Play Store. The study compared the privacy policies and labels of the… 

Impacts of Ransomware Attacks on Storage & Backup Security: A CISO Point of View

One thing is clear: the “business value” of data continues to grow, making it an organization’s primary piece of intellectual property. From a cyber risk perspective, attacks on data are the most prominent threat to organizations. Regulators, cyber insurance firms, and auditors are paying much closer attention to the integrity, resilience, and recoverability of organization…