Anonymous Sudan Hits Alabama Agencies With InfraShutdown
Anonymous Sudan has once again allegedly deployed its newest DDoS tool, InfraShutdown, targeting three government agencies in Alabama, United States. At the time of posting,…
Anonymous Sudan has once again allegedly deployed its newest DDoS tool, InfraShutdown, targeting three government agencies in Alabama, United States. At the time of posting,…
Stanford University announced that 27,000 individuals were impacted in the 2023 ransomware attack Pierluigi Paganini March 13, 2024 Threat actors behind the ransomware attacks that…
Stanford, CA – Stanford University is reaching out to individuals potentially impacted by a recent data security breach within its Department of Public Safety. The…
Atlanta-based Cyble Inc. has once again made waves in the cybersecurity industry. The trailblazing AI-powered threat intelligence platform secured a coveted position among the Top…
Researchers at HiddenLayer have unveiled a series of vulnerabilities within Google’s Gemini AI that could allow attackers to manipulate user queries and control the output…
In the modern digital age, where connectivity is paramount, the world’s reliance on the internet has never been greater. However, with this increased dependence comes…
Recently, LastPass appointed Asad Siddiqui as its CIO. He brings over two decades of experience leading startups and large technology organizations. It was the perfect…
Mar 13, 2024NewsroomPatch Tuesday / Software Update Microsoft on Tuesday released its monthly security update, addressing 61 different security flaws spanning its software, including two…
March 2024 brings a fresh focus on cybersecurity as Microsoft rolls out its latest set of patches, addressing 61 vulnerabilities in the Microsoft Patch Tuesday…
A new threat actor, Magnet Goblin, emerged by rapidly exploiting recently disclosed vulnerabilities (CVE-2023-46805 & CVE-2023-21887) in Ivanti Connect Secure VPN, which allowed them to…
In recent times, the landscape of cyber threats has been dominated by ransomware attacks, often involving double and triple extortion tactics. However, a new approach…
Many wireless headsets using Bluetooth technology have vulnerabilities that may allow malicious individuals to covertly listen in on private conversations, Tarlogic Security researchers have demonstrated…