Recent articles
-
How to Secure Your WordPress Site from Mu-Plugin Threats
Are you aware of the critical vulnerabilities that hackers exploit in WordPress mu-plugins? The alarming rise in cyber threats targeting…
-
Current Cybersecurity Threats and Vulnerabilities: Weekly Overview
In today’s digital age, staying ahead of cybersecurity threats is paramount for individuals and organizations alike. This week showcased significant…
-
Essential AWS Vulnerabilities: What You Must Address
In the realm of cloud security, AWS users must understand that not all security measures are guaranteed by the provider.…
-
Gamaredon Unleashes Phishing Campaign to Deploy Remcos RAT in Ukraine
Are you aware of how cyber threats are evolving in conflict zones? The Gamaredon group has recently launched a sophisticated…
-
New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials
Is your Android device safe from emerging threats like the Crocodilus Trojan? As cybersecurity professionals and mobile users, staying informed…
Author Details

Iulian Rotaru
Helping Businesses Stay Secure
Freelance Penetration Tester
Ethical Hacker
Cybersecurity Researcher