Blog
Welcome, we are
the Cyber Watchers
Subscribe to our newsletter to learn about the top
vulnerabilities and attacks across the globe.
vulnerabilities and attacks across the globe.
Oops! Something went wrong while submitting the form.
All articles
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

May 18, 2024
Brand Impersonation: Malicious Twitter, Google, Instagram, and WhatsApp Android apps steal credentials
cyberattacks
cybercriminals
Social Engineering

May 18, 2024
Honey-Tongued Hackers: The Cunning Tactics of APT42
cyberattacks
Social Engineering

May 18, 2024
Microsoft May 2024 Patch Tuesday
cyberattacks
Security Advisory

May 16, 2024
The AI Revolution in Cybersecurity: From Adversary to Ally
cyberattacks
cybercriminals

May 16, 2024
WordPress site Hacked; Leads visitors to DDOS Ukrainian Targets
cyberattacks
cybercriminals

May 16, 2024
WordPress site Hacked; Leads visitors to DDOS Ukrainian Targets
cyberattacks
cybercriminals

May 16, 2024
The AI Revolution in Cybersecurity: From Adversary to Ally
cyberattacks
cybercriminals

May 16, 2024
The AI Revolution in Cybersecurity: From Adversary to Ally
cyberattacks
cybercriminals

May 16, 2024
Ransomware attacks in Nigeria
cyberattacks
cybercriminals

May 16, 2024
Ransomware attacks in Nigeria
cyberattacks
cybercriminals
test

May 16, 2024
Increase in Emotet malware attack on Taiwan government
cyberattacks
cybercriminals
Sorry, we couldn’t find any results. Try another search.