Japan’s largest port stops operations after ransomware attack
The Port of Nagoya, the largest and busiest port in Japan, has been targeted in a ransomware attack that currently impacts the operation of container…
The Port of Nagoya, the largest and busiest port in Japan, has been targeted in a ransomware attack that currently impacts the operation of container…
The Swedish Authority for Privacy Protection (Integritetsskyddsmyndigheten – IMY) has fined two companies with 12.3 million SEK (€1 million/$1.1 million) for using Google Analytics and…
A security researcher and system administrator has developed a tool that can help users check for manifest mismatches in packages from the NPM JavaScript software…
Microsoft has denied the claims of the so-called hacktivists “Anonymous Sudan” that they breached the company’s servers and stole credentials for 30 million customer accounts.…
A phishing campaign that security researchers named SmugX and attributed to a Chinese threat actor has been targeting embassies and foreign affairs ministries in the…
Microsoft’s Edge browser has recently enhanced its ‘Edge Secure Network’ feature, which now offers 5GB of data, significantly increasing from the previously offered 1GB. The…
Forget crypto spam accounts, Twitter’s got another problem which involves bots and accounts promoting adult content and infiltrating Direct Messages and interactions on the platform. And…
Hundreds of thousands of FortiGate firewalls are vulnerable to a critical security issue identified as CVE-2023-27997, almost a month after Fortinet released an update that addresses…
A case of mistaken identity and further MOVEit Transfer data breaches continue dominated the ransomware news cycle this week. This week, the New York City…
Starting today, Twitter is no longer accessible on web and mobile apps if you don’t have an account, forcing all users to log in if…
Hackers exploit a zero-day privilege escalation vulnerability in the ‘Ultimate Member’ WordPress plugin to compromise websites by bypassing security measures and registering rogue administrator accounts.…
Attackers behind an ongoing series of proxyjacking attacks are hacking into vulnerable SSH servers exposed online to monetize them through proxyware services that pay for…