In today’s digital age, smartphones store vast amounts of personal information, from private messages and photos to sensitive financial and professional data. As a result, these devices have increasingly become central to criminal investigations. However, an important legal distinction exists between different methods of securing a phone—one that can significantly affect a person’s rights when...
Read More
CISA has issued an urgent alert warning organizations about a critical zero-day vulnerability in Cisco Secure Firewall Management Center (FMC) and Cisco Security Cloud Control that is actively exploited in ransomware attacks. Tracked as CVE-2026-20131, the flaw has been added to CISA’s Known Exploited Vulnerabilities (KEV) catalog on March 19, 2026, confirming active in-the-wild exploitation....
Read More
SEALSQ Corp. recently announced a partnership with WISeSat.Space Corp. to build and operate what they describe as the world’s first commercial Quantum Spatial Orbital Cloud, using a planned 100-satellite constellation to deliver quantum key distribution, quantum random number generation, and post-quantum identity services by subscription to enterprises and governments. This arrangement mirrors a hyperscale data-centre...
Read More
The Cybersecurity and Infrastructure Security Agency has issued an urgent warning regarding a critical zero-day vulnerability affecting heavily relied-upon Cisco security products. Tracked officially as CVE-2026-20131, this severe flaw is actively being exploited by cybercriminals in targeted ransomware campaigns. Organizations relying on Cisco Secure Firewall Management Center and Cisco Security Cloud Control must take immediate...
Read More
The head of the UK’s National Crime Agency (NCA) has warned that the country’s teens are being “radicalized” into becoming cybercriminals by online platforms. The NCA was set up over a decade ago to tackle serious and organized crime. In a speech to launch the NCA’s National Strategic Assessment this week, Graeme Biggar, NCA director general,...
Read More
Published on 19/03/2026 – 13:45 GMT+1 Cybersecurity experts are sounding the alarm about a new type of hacking campaign, called “DarkSword,” that could access personal data on millions of iPhones. ADVERTISEMENT ADVERTISEMENT The attacks target iPhones with iOS versions 18.4 through 18.6.2 with a “hit-and-run” technique that steals personal data, including a user’s text messages,...
Read More
Numerous reports, including Mashable’s own coverage, were published on Wednesday about a new hacker tool called DarkSword that is being used to target iPhones.  Apple has now shared with Mashable some important information regarding the threat and how the company is addressing it. According to Apple, the company last year patched the underlying iOS vulnerabilities...
Read More
In recent years, EDR killers have become one of the most commonly seen tools in modern ransomware intrusions: an attacker acquires high privileges, deploys such a tool to disrupt protection, and only then launches the encryptor. Besides the dominating Bring Your Own Vulnerable Driver (BYOVD) technique, we also see attackers frequently abusing legitimate anti-rootkit utilities...
Read More
Published On : 2026-03-20 Ransomware of the week CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – that could be relevant to your organization. Type: RansomwareTarget Technologies: Windows IntroductionCYFIRMA Research and Advisory Team has found Zollo Ransomware...
Read More
Cybercriminals are using the commercial advertising tracker Keitaro to hide online scams and malware behind ordinary-looking web traffic, with researchers identifying about 15,500 malicious domains linked to the activity over four months. The finding comes from joint research by Infoblox Threat Intel and ad security specialist Confiant. Examining Keitaro activity from the start of October...
Read More
1 2 3 4 5 12
National Cyber Security

FREE
VIEW