
Bisma Farrukh
Bisma is an experienced cybersecurity writer and analyst at CyberAlertica, with over five years of expertise in digital privacy, data protection, and cyber threat intelligence. She delivers in-depth analysis on security incidents, data breaches, and best practices for safeguarding information in an evolving threat landscape. In her free time, she enjoys exploring new books and travel destinations.

Claroty Report Exposes Critical Security Flaws in Building Management Systems
These vulnerabilities include those already exploited in ransomware campaigns and poorly secured internet-facing systems. While BMS and BAS platforms are ...See More

Do You Need Antivirus – Stay Safe in the Evolving Cyber Threat Landscape
Cyber threats continue to grow more sophisticated. Hackers constantly develop new malware variants, zero-day exploits, and convincing phishing schemes designed ...See More

INTERPOL Takedown Targets Over 20,000 Malicious Cybercrime Assets
Operation Secure, which ran from January to April 2025, brought together law enforcement agencies from 26 countries to dismantle cybercriminal ...See More

Cellcom Services Back Online After Wisconsin-Michigan Attack
The incident left many users with devices stuck in SOS mode for several days, unable to make calls or send ...See More

Coinbase Data Breach Exposes Customer Info; Faces Up to $400M in Losses
Cryptocurrency exchange Coinbase, which serves over 100 million users, has revealed it was the target of a sophisticated cyberattack involving ...See More

iClicker Website Compromised in Malware Attack Using Fake CAPTCHA
iClicker, a subsidiary of Macmillan, is used by over 5,000 instructors and 7 million students at colleges across the U.S., ...See More

LockBit Ransomware Panel Hacked, Sensitive Operational Data Leaked
The compromise was discovered on May 7, when a domain linked to LockBit’s admin panel was defaced with a message ...See More

What Is a Firewall? A Beginner’s Guide to Network Security
Whether you’re a tech enthusiast, business owner, or IT professional, understanding what a firewall is and how it functions is ...See More

Second Critical Vulnerability Found in OttoKit WordPress Plugin
Attackers are actively exploiting the bug to gain unauthorized access to vulnerable websites. OttoKit, previously known as SureTriggers, is an ...See More

What Is Phishing? How It Works, Examples, and Prevention Tips
In this blog post, we’ll break down what phishing is, how it works, the different types of phishing scams, and ...See More