Headlines
  • According to the US military, sixteen Iranian mine-laying ships have been "eliminated" in the Strait of Hormuz.
  • In the Strait of Hormuz, "unknown projectiles" had damaged three commercial ships.
  • Iran continues attacks in Saudi Arabia, the United Arab Emirates, and Kuwait, among other places.
  • Tehran is rocked by explosions as Iran claims that since the war started 11 days ago, US and Israeli forces have bombed about 10,000 civilian sites and killed over 1,300 citizens.
  • The Pentagon said on Tuesday that in the first ten days of the war with Iran, about 140 American service men have been injured.
  • Israel's military announced on Wednesday that it had triggered air defenses after spotting missiles coming from Iran.
  • After "temporary authorization from the Qatar Civil Aviation Authority," Qatar Airways said it will run 29 flights to and from Doha on Thursday.
  • Mohaddeseh Zolfi, an Iranian women's national football player, and Zahra Soltan Moshkehkar, a staff staff member, joined five other team members in seeking refuge in Australia.

Tag: Cyber Crime

October 9, 2025

Supply Chain Attack

A supply chain attack is a type of cyberattack that targets at a reliable third-party vendor that provides software or services vital to the supply chain.

October 8, 2025

AI Voice Scams

Artificial intelligence (AI) voice scams use advanced AI to imitate human voices.It’s simple to imitate someone’s voice using deep learning algorithms, which makes fake calls seem real.

October 7, 2025

Evil Twin Attack

When a hacker installs a fake Wi-Fi access point that looks like a real one, it’s known as an evil twin attack. It is intended to trick users into connecting to this rogue access point by making them believe they are connecting to a reliable network.

October 6, 2025

Whale Phishing Attack

Whale phishing, also known as whaling, is a kind of phishing attack in which fake emails, texts, or phone calls are sent to senior corporate executives.

October 3, 2025

Code Injection Attacks

The term “code injection” refers attacks in which malicious code is injected into an application. The performance and functionality of the program are then impacted as the code is interpreted or run by the application. Existing data vulnerabilities, like improper processing of data from untrusted sources, are usually exploited by code injection attacks.

October 2, 2025

AI Powered Cyber Stalking

With the use of artificial intelligence, stalking is becoming faster and difficult to detect.With misuse of AI techniques like deepfakes, automated tracking, voice cloning, and AI chatbots, cyberstalking has changed in 2025, becoming more challenging to detect.

October 1, 2025

Zero Day Cyber Attacks

Cyber criminals gain an unfair edge by using malicious tools known as “zero-day exploits,” which take advantage of unknown flaws in firmware, hardware, or software.

September 30, 2025

GenAI in Cyber Security

In cybersecurity, generative AI is an effective weapon for both cyber criminals and for businesses and organisations who want to protect their networks and devices.

September 29, 2025

Be Prepared for Increasingly Complex AI...

AI-powered cyberattack uses machine learning  algorithms to do malicious activities.These attacks are increasingly complex, focused, and difficult to detect since they automate using artificial intelligence.

September 26, 2025

Yahoo Boys Scam

Cybercriminals known as the Yahoo Boys, who are based in Nigeria, prey on victims in the United States, Australia, Canada, Europe and other parts of the world.Mostly young, unemployed men, they use romance scams to defraud their victims.

Top