Online Safety For Kids The internet comes with unending possibilities, making life easier for everyone byNaomi AdamuAugust 6, 2023
CSEAN ‘s First CTF Competition (CTF 1.0) – CSEAN Cyber Secure Conference 2023 The Cyber Security Experts Association of Nigeria (CSEAN), the leading byCybersecfillAugust 6, 2023
Information Protection Strategy for Your Business. With so many data created every day and different devices used across bySimbiat SadiqJuly 29, 2023
Diary of Hackers Launches a Youth Led Cybersecurity Awareness and Capacity Building Initiative. With the ever-growing dependence on technology, without doubt, the internet byCybersecfillJune 22, 2023
ArticleJune 15, 2021 Be Prepared…Cybercriminals Are Coming For SOHOs! Be honest – what’s the first thought that comes to mind when you read SOHO? byHenrietta Ijenebe
NewsApril 6, 2021 Facebook Users Data Leaked!!! The personal information of half a billion Facebook users has been leaked byHenrietta Ijenebe
NewsAugust 15, 2019 Privilege Escalation Vulnerability Discovered in Trend Micro Password Manager. Peleg Hadar, a security researcher at safe breach Labs has discovered a byCybersecfill
NewsMay 28, 2019 Researcher have Discovered a Malware Vulnerability in MacOS Filippo Cavallarin have discovered a security hole in the MacOS byCybersecfill
NewsMay 18, 2019 TeamViewer was Breached by Chinese Hackers in 2016 Teamviewer, one of the most popular software in the world that allows users to byCybersecfill
NewsMay 17, 2019 Stack Overflow – Hackers Breached Production Sytem Stack overflow, the internet’s largest Q&A site for programming and byCybersecfill
NewsMay 14, 2019 WhatsApp Discovers new Vulnerability,Urges Users to Update their Application WhatsApp has revealed a vulnerability in its system could have allowed hackers byCybersecfill
NewsMay 10, 2019 Unpatched Flaw in UC Browser Applications Can Aid Phishing Attack An unpatched browser address bar spoofing vulnerability that affects popular byCybersecfill
NewsMay 1, 2019 Dozens of Email Clients Found Vulnerable to Signature Spoofing Attack. A team of security researchers has discovered several vulnerabilities in various byCybersecfill