Quantum Safety News Center

Your sources for the latest in quantum safe technologies, zero trust architecture and next-gen cybersecurity for distributed workforces.

Fake Telegram Apps: New Android Malware Threatens User Security

Discover the latest malware campaign targeting Android users with fake Telegram apps. Learn how to protect your data and stay secure.

By Alan V Gutnov 2 min read
Read full article

Zimperium Reveals New Android Malware Evasion Techniques and Risks

Discover the sophisticated Konfety malware targeting Android devices. Learn about its evasion techniques and how to protect your mobile environment.

By Alan V Gutnov 3 min read
Read full article

Cyberattacks Update: Ransomware Strikes Durant and Governments

Stay informed about the June ransomware attack in Durant. Learn about the impact on services and how to protect your information. Read more.

By Edward Zhou 3 min read
Read full article

Protect Yourself from Callback Phishing Scams: Key Tips and Examples

Learn how to identify and protect yourself from callback phishing scams. Stay safe with effective strategies. Read more for tips!

By Edward Zhou 3 min read
Read full article

Recent Vulnerabilities in WordPress Plugins: Malware Risks and Solutions

Discover critical vulnerabilities in WordPress plugins and learn how to protect your website. Act now to secure your site from malware risks!

By Edward Zhou 3 min read
Read full article

Columbus Allocates $23M for Cybersecurity Upgrades After Attacks

Columbus invests $23 million in cybersecurity upgrades to enhance defenses against ransomware attacks. Learn about the zero-trust network initiative now!

By Edward Zhou 3 min read
Read full article

Recent Vulnerabilities in WordPress Plugins: Malware Scanner Issues

Discover the critical vulnerability in the Malcure Malware Scanner plugin that can lead to file deletion. Uninstall immediately for your site's safety!

By Edward Zhou 3 min read
Read full article

Vulnerability Allows Hackers to Remotely Control Train Brakes

Discover serious vulnerabilities in U.S. train brake systems that allow hackers to remotely engage brakes. Learn about the risks and needed reforms.

By Alan V Gutnov 3 min read
Read full article

U.S. Allocates $1B for Offensive Cyber Operations Amid Budget Cuts

Explore the U.S. cyber operations budget allocation including funding shifts for offensive and defensive measures. Understand the implications for national security.

By Edward Zhou 3 min read
Read full article