Recent articles
-
Microsoft Alerts on Tax-Season Phishing Using PDFs and QR Codes
In an era where phishing attempts are on the rise, the tax season poses a particular threat, as Microsoft recently…
-
Lazarus Group Exploits Job Seekers with ClickFix Tactic and GolangGhost Malware
As cybersecurity threats evolve, understanding the tactics employed by malicious actors is crucial. Recently, the Lazarus Group, a sophisticated North…
-
AI Threats Are Evolving Fast Learn Practical Defense Tactics in this Expert Webinar
Artificial intelligence is transforming the landscape of cybersecurity, posing both threats and opportunities. As criminal tactics evolve rapidly alongside these…
-
AI Adoption in the Enterprise: Overcoming Security and Compliance Challenges
AI adoption in enterprises presents both significant promise and formidable challenges, particularly due to security and compliance issues. This blog…
-
Google Resolves Silent File Transfer Vulnerability in Quick Share
Did you know that a recently disclosed vulnerability in Google’s Quick Share could allow unauthorized file transfers? This critical flaw,…
Author Details

Iulian Rotaru
Helping Businesses Stay Secure
Freelance Penetration Tester
Ethical Hacker
Cybersecurity Researcher