My Courses
-

PLoB: A Framework for Behavioral Fingerprinting to Detect Malicious Login Attempts.
Splunk researchers have developed an innovative system designed to fingerprint post-logon behaviour, leveraging artificial intelligence to detect subtle signals indicative of potential intrusions. This framework,…
-

Malicious actors exploit smart contracts to siphon over $900,000 from user cryptocurrency wallets.
In early 2024, a sophisticated campaign emerged, revealing that cybercriminals were distributing malicious Ethereum smart contracts disguised as lucrative trading bots. These weaponised contracts utilised…
-

UAC-0099 Hackers Exploiting HTA Files to Distribute MATCHBOIL Loader Malware
The Ukrainian threat intelligence group UAC-0099 has significantly advanced its cyber warfare capabilities by deploying a sophisticated malware toolkit aimed at Ukrainian state authorities, Defence…
-

More than 1 million individuals affected by the DaVita data breach.
DaVita has recently informed over 1 million individuals that their personal and health information has been compromised in a significant ransomware attack. This breach has…
-

WhatsApp has introduced a new security feature that enables users to pause, inquire about, and verify potentially harmful messages.
WhatsApp has introduced a robust security enhancement featuring a “pause, question, and verify” protocol aimed at safeguarding users from advanced messaging scams. In the first…
-

Pandora, the worldwide jewelry brand, has experienced a security breach resulting in the exposure of customer information.
Danish jewellery giant Pandora has disclosed a significant data breach that compromised customer information through a third-party vendor platform. The company has begun notifying affected…





