An operation led by French and US authorities, and strongly supported by Europol, has targeted the crypto exchange platform Bitzlato. The globally...
Law enforcement and judicial authorities from Bulgaria, Cyprus, Germany and Serbia, supported by Europol and Eurojust, have teamed up against...
This means 6 years of helping ransomware victims unlock encrypted files, providing tips on how to avoid getting infected and keeping money out of the...
Every day, advertisements for medicines invade the Internet, posted on social media networks or other websites. However, behind this slick marketing...
SSNDOB, an online marketplace that sold the names, social security numbers, and dates of birth of approximately 24 million US people, has been taken...
A total of 18 children have been tentatively identified and two offenders apprehended as a result of the 10th edition of Europol’s Victim...
2022
Europol askes once again Europeans for their help to find them to make the EU a safer place for citizens. “All of these criminals are on the run, fleeing from responsibility and punishment. This makes it difficult for their victims, their friends and relatives to find closure. Let’s help...
More ›››Cybercrime is one of the most prevalent forms of crime in the world. It can be defined as the intentional exploitation of computer networks, systems and technology-dependent enterprises. There are different types of cybercrime that include the use of malicious codes to modify data and gain...
More ›››Online Shopping ‘Online shopping’ refers to purchases made either on a computer or on a smart phone/tablet. You can shop online with or without full authentication. Using a card is a safe method of payment in online shopping as long as you exercise the same care as in other shopping. Before...
More ›››Tens of thousands of QNAP network-attached storage (NAS) devices are waiting to be patched against a critical security flaw addressed by the Taiwanese company on Monday.
Microsoft is urging customers to keep their Exchange servers updated as well as take steps to bolster the environment, such as enabling Windows Extended Protection and configuring certificate-based signing of PowerShell serialization payloads.
Οι κυβερνοεγκληματίες επιχειρούν να εξαπατήσουν τους χρήστες με σκοπό την υποκλοπή περιουσιακών τους στοιχείων, αποκρύπτοντας κακόβουλες διευθύνσεις URL σε κενά αρχεία εικόνων παρακάμπτοντας με αυτό τον τρόπο τις άμυνες λογισμικών προστασίας.
A suspected China-nexus threat actor exploited a recently patched vulnerability in Fortinet FortiOS SSL-VPN as a zero-day in attacks targeting a European government entity and a managed service provider (MSP) located in Africa.
Εκεί που συνηθίζουμε τους κωδικούς πρόσβασης που χρησιμοποιούμε στους λογαριασμούς μας ή στις συσκευές μας, καλούμαστε να τους αλλάξουμε ανά τακτά χρονικά διαστήματα για να έχουμε μεγαλύτερη ασφάλεια.
Users of Zoho ManageEngine are being urged to patch their instances against a critical security vulnerability ahead of the release of a proof-of-concept (PoC) exploit code.