A landmark MoU signed in Rabat paves the way for a major Franco-Moroccan partnership to establish a Center of Excellence in Data and Artificial Intelligence, positioning...
Dissecting the internals of modern credential theft campaigns with command-line insights, evasion techniques, and real-world behavior. 🧬 Introduction In 2025, cybercriminals are no longer relying on...
Modified RAT malware and proxy networks target global victims with stealthy credential theft and advanced evasion tactics. When María López clicked to “Update Policy,” she unwittingly...
A coordinated cyberattack led by Moroccan hacker Jokeir 07x and groups Dark Hell 07x and Dr. Shell 08x compromises key Tunisian institutions, exposing government systems, banking...
CoinDCX Confirms Internal Account Compromise, Assures Users Their Funds Remain Safe as Firm Absorbs Entire Loss New Delhi, India — July 22, 2025In a dramatic blow...
As Morocco’s citizens turn to cyber offices to access essential public services, sensitive personal data may be at risk—raising urgent questions about digital security, regulatory gaps,...
Opposition party calls for accountability and nationwide protest after hacker group Jabaroot leaks CNSS records, ministerial emails, and financial contracts allegedly exposing high-level corruption. Rabat, Morocco...
TADTS under scrutiny for delayed breach notification as ransomware group leaks trove of sensitive personal data, igniting legal backlash and public outrage. Texas Alcohol & Drug...
As cyberattacks grow in scale and complexity, leading cybersecurity firms are turning to cutting-edge attack simulation tools like SafeBreach, XM Cyber, and CALDERA to preempt threats,...
CVE-2023-29357 allows attackers to forge tokens and gain administrative control over SharePoint servers, paving the way for full remote code execution in enterprise environments. Critical Microsoft...