Category: Email Breach
-
Google Sues App Developers Over Fake Crypto Investment App Scam
Google has filed a lawsuit against two app developers for engaging in an “international online consumer investment fraud scheme” that tricked users into downloading bogus Android apps from the Google Play Store and other sources and stealing their funds under the guise of promising higher returns. The individuals in question are Yunfeng Sun (aka Alphonse…
-
Hackers Exploit Magento Bug to Steal Payment Data from E-commerce Websites
Threat actors have been found exploiting a critical flaw in Magento to inject a persistent backdoor into e-commerce websites. The attack leverages CVE-2024-20720 (CVSS score: 9.1), which has been described by Adobe as a case of “improper neutralization of special elements” that could pave the way for arbitrary code execution. It was addressed by the company as part of…
-
10 Wildly-Successful Blogs That Earn Outlandish Incomes
In an astounding feat of bits and bytes, the internet buzzes with activity, teeming with thousands of terabytes of digitized information flowing every minute. It is a spectacle of data whizzing around the globe, invisible to the naked eye, but conveyed in the digital algorithms and lossless-compression systems that allow us to instantly see, chat and…
-
Google to Delete Billions of Browsing Records in ‘Incognito Mode’ Privacy Lawsuit Settlement
Google has agreed to purge billions of data records reflecting users’ browsing activities to settle a class action lawsuit that claimed the search giant tracked them without their knowledge or consent in its Chrome browser. The class action, filed in 2020, alleged the company misled users by tracking their internet browsing activity who thought that it…
-
Tuta becomes the first quantum-resistant email service with new hybrid protocol
Tuta claims to be the first secure email provider to offer post-quantum protection in the build-up to Q-Day. As of March 11, 2024, German provider Tuta, formerly known as Tutanota, launched TutaCrypt. It’s a new hybrid protocol that combines conventional encryption and quantum-resistant algorithms. The popular secure email provider claims to be the first to…
-
OpenAI Has Released Damning Elon Musk Emails
This may shock you, but I am no fan of Elon Musk. If I wanted, I could go on about my misgivings of the arrogant billionaire for hours. But, one recent event sums up my feelings towards him. You see, back in 2015, Musk and a few of his friends founded OpenAI, a non-profit to…
-
Facebook tried to spy on Snapchat through users’ devices, court documents allege
Filings unsealed last week claim that Meta created an internal effort to spy on Snapchat in a secret initiative called “Project Ghostbusters.” Meta has lots of data through Instagram, WhatsApp, and Facebook, but that’s not enough for them. Court filings unsealed last week allege Meta created an internal effort to spy on Snapchat in a…
-
Chrome’s Standard Safe Browsing Now Has Real-Time URL Protection
Chrome’s standard Safe Browsing protections now provide real-time malicious site detection and Password Checkup on iOS now flags weak passwords. Google today announced that the standard Safe Browsing protections in the Chrome browser can now identify bad sites in real time. The real-time protection was previously available if the Enhanced protection mode was enabled in…
-
South African pension fund attack admitted by LockBit
South Africa’s Government Employees Pension Fund, which is the largest fund of its kind in Africa, was claimed to have been compromised by the LockBit ransomware operation in an intrusion last month that resulted in operational and pension payment disruptions, according to The Record, a news site by cybersecurity site Recorded Future. Advertisement Such claims…
-
Russian Hackers Use ‘WINELOADER’ Malware to Target German Political Parties
The WINELOADER backdoor used in recent cyber attacks targeting diplomatic entities with wine-tasting phishing lures has been attributed as the handiwork of a hacking group with links to Russia’s Foreign Intelligence Service (SVR), which was responsible for breaching SolarWinds and Microsoft. The findings come from Mandiant, which said Midnight Blizzard (aka APT29, BlueBravo, or Cozy Bear) used the…
Recent Posts
- Hollywood vs. The Pentagon: A Clash Over Missile Defense and a $50 Billion “Dome”

- 🌍 Four African Countries Removed From Global Illicit Money Flow List

- 🇸🇩 Khartoum International Airport officially declared unfit for operation

- 🇲🇦 Moroccan airline Royal Air Maroc will launch flights between Casablanca and Saint Petersburg in 2026.

- 🇳🇪 American Missionary Kidnapped in Niger’s Capital, Heightening Security Concerns

Tags
Africa African Union Algeria Banking Sector Burkina Faso China Cryptocurrency DRC ECOWAS Egypt Ethiopia France Ghana Gold Guinea Haiti Immigration Kenya Liberia Libya Mali Military Industries Mining Morocco Niger Nigeria Oil & Gas Industry Pan African Communication Pan African Nations Presidential Elections Protest Republic of Liberia Russia Senegal Sierra Leone Somalia South Africa Sudan Terrorism Uganda United Nations United States United States of America West Africa Zimbabwe
Comments
Wow wonderful blog layout How long have you been blogging for you make blogging look easy The overall look of…
𝕋𝕙𝕒𝕟𝕜𝕤 𝕗𝕠𝕣 𝕥𝕙𝕖 𝕦𝕡𝕕𝕒𝕥𝕖 .