Blogs
Hacktivism: A Threat to Cybersecurity

Hacktivism: A Threat to Cybersecurity

Given the massive evolution that both the Internet and the world of computers have undergone over the past decade, it’s no surprise to see the influence they have on the various social issues in our world. As seen when Dragon Force Malaysia unleashed a wave of cyber...

Cybersecurity skills shortage in today’s workforce

Cybersecurity skills shortage in today’s workforce

Introduction Knowledge is power, and ignorance is bliss. There are two statements that, although contradicting each other, hold true in modern society. In many cases, the more you know, the better equipped you are to perform specific tasks and requirements. Similarly,...

Indian Airline Ransomware Attack

Indian Airline Ransomware Attack

On 26th May 2022, it was reported ransomware attack on an Indian airline caused passengers to be trapped in the aircraft for at least up to five hours. The news of the Indian Airline, SpiceJet facing problems following the cyber-attack has been circulating on Twitter....

Online Scams Nightmare for Malaysians

Online Scams Nightmare for Malaysians

Online scams are various fraud methods that are facilitated by cybercriminals on the Internet. Frauds can happen in many ways using phone chat applications, fake websites, fake online shopping apps and many more. On 14th March 2022, it was reported that Malaysians...

Hackers use fake websites to hide malware

Hackers use fake websites to hide malware

Malware, a short-term word for malicious software, has plagued the computer industry for decades. The introduction of new and exciting technologies has allowed malware to undertake massive evolution. This can be seen in the case of the well-known NFT project,...

Hackers stole NFTs worth millions

Hackers stole NFTs worth millions

NFTs are a modern day buzzword. Many people, especially the younger generations who are tech savvy are showing high interest in NFTs. Because of this, hackers have been looking to exploit this interest by using methods to acquire them illegally using their schemes to...