The export of arms to Russia despite the embargo is a disgrace to the whole EU! So far, four packages of sanctions have been approved at the EU level against Russia in response to the attack on Ukraine. What is less well known, however, is that some of the sanctions were already imposed after Russia’s […]
Google's Threat Analysis Group (TAG) on Thursday disclosed that it acted to mitigate threats from two distinct government-backed attacker groups based in North Korea that exploited a recently-uncovered remote code execution flaw in the Chrome web browser.
The campaigns, once again "reflective of the regime's immediate concerns and priorities," are said to have targeted U.S. based organizations
Anonymous has attacked the Central Bank of Russia (CBR), according to a post on social media. The hacking group, which vowed to hit Russian government websites after Moscow launched its military assault on Ukraine, now says it’s also targeting foreign companies still operating in Russia. Anonymous Threatens to Release Thousands of Bank of Russia Files […]
Here are the top trending news from the world of Technology 1) Pretty soon, you can rent an iPhone with monthly subscription fees If Apple has its way then you can pretty soon rent an iPhone by paying a monthly subscription fees. According to Bloomberg, Apple is seriously planning to launch a hardware subscription service [...]
Your time has come, Valorians! Godfall: Ultimate Edition marks the arrival of the epic action RPG on Xbox One and Xbox Series X|S. The team here at Counterplay Games can’t wait for the Xbox community to dive into this epic high fantasy playground we’ve created for you. Let’s jump in and look at some of […]
A Chinese-speaking advanced persistent threat (APT) has been linked to a new campaign targeting gambling-related companies in South East Asia, particularly Taiwan, the Philippines, and Hong Kong.
Cybersecurity firm Avast dubbed the campaign Operation Dragon Castling, describing its malware arsenal as a "robust and modular toolset." The ultimate motives of the threat actor are not immediately