Hoya’s optics production and orders disrupted by cyberattack
Hoya Corporation, one of the largest global manufacturers of optical products, says a “system failure” caused servers at some of its production plants and business…
Hoya Corporation, one of the largest global manufacturers of optical products, says a “system failure” caused servers at some of its production plants and business…
Apr 04, 2024NewsroomPhishing Attack / Malware An updated version of an information-stealing malware called Rhadamanthys is being used in phishing campaigns targeting the oil and…
Cancer treatment and research center City of Hope is warning that a data breach exposed the sensitive information of over 820,000 patients. City of Hope…
Security researcher Bartek Nowotarski disclosed a new class of vulnerabilities within the HTTP/2 protocol, known as the HTTP/2 CONTINUATION Flood. This attack vector is proving…
The AhnLab Security Intelligence Center (ASEC) has detected a sophisticated cyberattack targeting users of the popular text and code editor, Notepad++. Hackers have successfully manipulated…
In recent times, cyber attacks have targeted various facets of our digital infrastructure, ranging from national networks to IoT devices. However, the emergence of a…
On April 2, 2024, Jackson County tweeted that it had identified significant disruptions within its IT systems, “potentially attributable to a ransomware attack”. Jackson County…
A suspected Vietnamese-origin threat actor has been observed targeting victims in several Asian and Southeast Asian countries with malware designed to harvest valuable data since…
Extensive automation of cyber security operations could become a game-changer, and the concept of playbook-driven security automation is advancing rapidly. Cyber attacks are becoming more…
Diving into pentest readiness, this comprehensive preparation guide is adaptable to different types of pentest, regardless of the target’s size or complexity. In Part 1…
Among the never-ending list of malicious software that threat actors use in cyber attacks are viruses, worms, trojans, ransomware, spyware, and adware. Today’s malware is…
Google fixed three vulnerabilities in the Chrome browser on Tuesday, along with another zero-day exploit that was exploited during the Pwn2Own Vancouver 2024 hacking contest. Google recently…