Blog
Welcome, we are
the Cyber Watchers
Subscribe to our newsletter to learn about the top
vulnerabilities and attacks across the globe.
vulnerabilities and attacks across the globe.
Oops! Something went wrong while submitting the form.
All articles
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

October 31, 2024
SolarSys Trojan
Trojan
Malware
phishing
data breaches
Dataprotection

October 31, 2024
When Security Enhancements Meet the Infostealer's Toolbox
Dataencryption
CyberAwareness
Malware
Infostealers
Ransomware

October 31, 2024
Fake IT Help Desks on Microsoft Teams: Black Basta’s New Ransomware Tactic"
Ransomware
phishing
CyberThreat
Employeetraining

October 24, 2024
Understanding Beast Ransomware: A Growing Threat
Systemscan
Ransomware
Employeetraining
threatdetection
incidentresponse

October 24, 2024
Deceptive Fix: The Google Meet Scam Targeting Your Trust
threatdetection
Malware
phishing
Endpointprotection

October 24, 2024
A Ticking Time Bomb
CyberAwareness
Riskassessments
Endpointprotection
Business continuity plan
Dataprivacy

October 17, 2024
The Evolution of QR Code Phishing—And Why You Could Be the Next Target
Quishing
EmailSafety
CyberAwareness
SecurityTraining

October 17, 2024
When Your Inbox Rings: The Rise of Callback Phishing (TOAD Attacks)
phishing
EmailSafety
CyberAwareness
Malware
Online Safety

October 17, 2024
FASTCash Strikes Again—This Time, Linux is the Target!
Dataprotection
Malware
Cybercriminals
SecurityTraining

October 10, 2024
The Rise of Mamba 2FA – A New Threat in Phishing Attacks
threatdetection
MFA
phishing
SecurityTraining

October 10, 2024
The Fake Update Saga
No items found.

October 10, 2024
SIEM-ulated Threats: When Cybercriminals Use Security Tools to Their Advantage
Wazuh
Siem
CryptBot Malware
CyberThreat
cybersecurity
Sorry, we couldn’t find any results. Try another search.