Headlines
  • On Monday at 14:00 GMT, the US military says it would start blockading Iranian ports, preventing ships from entering or leaving Iran from passing through the Strait of Hormuz.
  • In the southern town of Biyyada, Hezbollah claims that its men have attacked Israeli soldiers with "a swarm of attack drones."
  • US President Donald Trump's threat to block the Strait of Hormuz was deemed "ridiculous" by Iran's navy chief, Shahram Irani.
  • Any military ships approaching the Strait of Hormuz "will be considered a violation of the ceasefire and will be met with severe force," according to a statement released on Sunday by Iran's Islamic Revolutionary Guard Corps (IRGC).
  • The speaker of Iran's parliament Mohammad Baqer Ghalibaf ​ is leading the delegation that has arrived to Pakistan for talks with the United States.
  • Nawaf Salam, the prime minister of Lebanon, stated that he was working to ensure the withdrawal of Israeli forces and to put an end to the Israel-Hezbollah conflict.
  • Viktor Orban, the longtime prime minister of Hungary, has conceded defeat to Peter Magyar in the country's legislative election.

Tag: Hackers

April 3, 2026

Password Spraying Attack

In a type of brute-force cyber attack as “password spraying,” attackers try to get access to several accounts using a small number of frequently used passwords.

April 2, 2026

Domain Name Systems (DNS) Exfiltration

Domain Name Systems (DNS) exfiltration is a cyberattack tactic in which a attacker uses DNS requests to covertly send private information from a compromised system to an outside server.

April 1, 2026

Intrusion Detection System (IDS)

A network security tool called an intrusion detection system (IDS) was first developed to find vulnerability exploits against a target computer or application.

March 27, 2026

North Korean Hackers Offer $70,000 Per...

Cybersecurity engineer Toufik Airane was approached by a North Korean hacker who offered him a small fortune in exchange for use his of his identity—and he has the screenshots to prove it.

March 23, 2026

Data Loss Prevention (DLP)

In order to help organizations and businesses monitor and safeguard sensitive information across on-premises systems, cloud-based locations, and endpoint devices, data loss prevention is a security solution that detects and helps in preventing malicious or inappropriate sharing, transfer, or use. 

February 27, 2026

Dictionary Attack: How to Avoid

A dictionary attack involves methodically inputting each word in a dictionary or word list as a password in order to gain access to a password-protected computer, network, or other IT resource.

October 7, 2025

Evil Twin Attack

When a hacker installs a fake Wi-Fi access point that looks like a real one, it’s known as an evil twin attack. It is intended to trick users into connecting to this rogue access point by making them believe they are connecting to a reliable network.

August 15, 2025

Pro Russian Hacking Group NoName057(16)

A pro-Russian hacker group called NoName057(16) is well-known for its cyberattacks against European, American, and Ukrainian government, media, and private company websites. Considered a free and unstructured pro-Russian activist group, it aims to garner notice in Western nations.

July 30, 2025

Ethical Hacking

An authorized attempt to obtain illegal access to a computer system, application, or data by using the tactics and behaviours of malicious attackers is known as ethical hacking. This method helps in locating security flaws that can be fixed before a malicious attacker can take advantage of them.

June 10, 2019

USG Recruiting the Next Generation of...

Online data is at risk. Hackers are getting smarter and companies across the globe are facing a shortage of trained professionals who can help protect their data~ VOA NEWS

Top