Blog
Welcome, we are
the Cyber Watchers
Subscribe to our newsletter to learn about the top
vulnerabilities and attacks across the globe.
vulnerabilities and attacks across the globe.
Oops! Something went wrong while submitting the form.
All articles
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

January 24, 2025
How I Almost Fell for a “Scam Yourself” Attack (and What You Can Learn from It)
Cybervergent
Cybersecurity
scam
onlinescam
Online Safety

January 17, 2025
Ransomware Reinvented: How “Codefinger” Hijacks AWS Encryption to Hold Data Hostage
Ransomware
Codefinger
AWS
AWS Encryption

January 17, 2025
Exploitation of Zero-Day Vulnerability in Fortinet Systems
vulnerability assessment
Zero Day Vulnerability
Fortinet Systems

January 17, 2025
Starting Strong
Cybervergent
Cybersecurity
cybersecurityexperts
Online Safety

January 15, 2025
Microsoft Patch January
Microsoft Patch
Cybersecurity

December 16, 2024
Team Deception: Black Basta’s Social Engineering Renaissance
Cybersecurity
Malware
SocialEngineering

December 16, 2024
The Bank of Uganda Breach
cyberattacks
CyberThreat
Insiderthreats

December 16, 2024
Meetio, Meeten, and the Web3 Woes: Inside the AI-Powered Crypto Scam
Cybersecurity
CryptBot Malware
Ai

December 12, 2024
Corrupted File or a Cybercriminal Masterpiece?
Cybersecurity
Cybercriminals
cybercrime
Malware

December 12, 2024
“Annual Benefits” or a Ticket to Trouble? The New Phishing Plot You Need to Know!
phishing
phishinglinks

December 12, 2024
Keeping Up with Malvertising Campaigns
Cybersecurity
Maliciousactivities
Malware
Maliciousactors
MalwareAttacks

November 28, 2024
Elevating Security: Implementing Privileged Access Management (PAM)
securitybestpractise
CyberDefence
Securityanalytics
Passwordmanagement
Sorry, we couldn’t find any results. Try another search.