Blog
Welcome, we are
the Cyber Watchers
Subscribe to our newsletter to learn about the top
vulnerabilities and attacks across the globe.
vulnerabilities and attacks across the globe.
Oops! Something went wrong while submitting the form.
All articles
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
December 16, 2024
Team Deception: Black Basta’s SocialEngineering Renaissance
Cybersecurity
Malware
SocialEngineering
December 16, 2024
The Bank of Uganda Breach
cyberattacks
CyberThreat
Insiderthreats
December 16, 2024
Meetio, Meeten, and the Web3 Woes: Inside the AI-Powered Crypto Scam
Cybersecurity
CryptBot Malware
Ai
December 12, 2024
Corrupted File or a Cybercriminal Masterpiece?
Cybersecurity
Cybercriminals
cybercrime
Malware
December 12, 2024
“Annual Benefits” or a Ticket to Trouble? The New Phishing Plot You Need to Know!
phishing
phishinglinks
December 12, 2024
Keeping Up with Malvertising Campaigns
Cybersecurity
Maliciousactivities
Malware
Maliciousactors
MalwareAttacks
November 28, 2024
Elevating Security: Implementing Privileged Access Management (PAM)
securitybestpractise
CyberDefence
Securityanalytics
Passwordmanagement
November 28, 2024
Driver’s License to Kill: Malware Hijacks Avast Anti-Rootkit for Kernel-Level Carnage
RANSOMEWARE
CyberThreat
cybercrime
cyberextortion
November 28, 2024
Operation Serengeti—A Unified Stand Against African Cybercrime
cybercrime
cyberextortion
CyberThreat
onlinescam
November 28, 2024
Phishing for Trust – When Google Docs and Weebly Go Rogue
phishing
Fakesoftware
Securityawareness
SecurityTraining
November 22, 2024
LodaRAT’s Grand Encore: Back in Action, and Bolder Than Ever
Malware
Access Control
phishing
CyberDefence
November 22, 2024
SafePay Ransomware: A Rising Threat to Payment Processors and Banks
Endpointprotection
Databreach
CyberDefence
CyberThreat
RANSOMEWARE
Sorry, we couldn’t find any results. Try another search.