Example of a PDF attachment with a QR code. Malicious QR codes commonly appear in mass phishing campaigns as well as targeted ...
Selling items online? Beware of suspicious links sent by fake buyers under the guise of making payment or arranging delivery, ...
The police encourage sellers who list items online to meet the buyers in person. Read more at straitstimes.com. Read more at ...
Researchers uncovered 27 malicious npm packages used over five months to host phishing pages that steal credentials from ...
Here are Netcraft’s five predicted trends for 2026: ...
ShinyHunters claims responsibility for stealing 94GB of Pornhub user data affecting over 200 million records and demands ...
Kenya recorded over 2.5 billion cyber threat events in the first quarter of 2025 (January to March), according to reports ...
As artificial intelligence moves from experimentation to production and cyber threats escalate, the Middle East is entering a ...
AS the year 2025 comes to an end, one thing has become very clear in Tanzania: Our daily lives are now more connected to the ...
Taking action over a growing spy threat from Beijing is not about paranoia. It is about recognising power and vulnerability ...
Is it time for Malaysians to consider personal cyber insurance as a protection against potential losses? Here's what experts ...