by Alicia Motubatse | Oct 3, 2025 | 2025
The PDF Trap: How MatrixPDF Turns Trusted Files into Stealthy Phishing Weapons Cybersecurity researchers at Varonis have uncovered a new phishing method using a toolkit called MatrixPDF, which turns seemingly harmless PDF attachments into powerful delivery tools for...
by Alicia Motubatse | Sep 9, 2025 | 2025
Russia’s ‘Max’ App Aims to Replace WhatsApp Russia is intensifying its control over digital communications by restricting non-Russian apps like WhatsApp and Telegram while promoting its own state-backed “super-app” called Max. Developed by VK (VKontakte),...
by Alicia Motubatse | Sep 1, 2025 | 2025
Urgent Warning for Email Users After Major Data Leak Surfaces Online A major security alert has been issued affecting billions of email users worldwide following the emergence of a massive database of leaked credentials being sold on the dark web. While the breach did...
by Alicia Motubatse | Aug 22, 2025 | 2025
The Cost of a Breach: Lessons from a Major Cyberattack A major American technology and multinational corporation has confirmed a significant data breach that occurred in June 2025. According to an article by Forbes cited on:...