Ransomware attack causes British newspaper “The Guardian” to close its offices for 3 more weeks
A prominent British newspaper that was subjected to a ransomware attack a month ago has informed its employees that its offices would remain closed for…
A prominent British newspaper that was subjected to a ransomware attack a month ago has informed its employees that its offices would remain closed for…
SickKids Hospital, located in Toronto, is a center for medical education and research with a primary emphasis on the treatment of ill children. On December…
Websites that are powered by WordPress have been the target of attacks by hackers for a number of years. Experts in information security keep track…
Numerous Netgear WiFi router models were susceptible to a high-severity vulnerability that had been patched by Netgear. Multiple variants of the Wireless AC Nighthawk, Wireless…
The Hospital for Sick Children in Toronto, which is the biggest pediatric healthcare facility in Canada, is currently in the process of recovering from a…
On December 27, the Indian Railways network had a data breach that resulted in the exposure of the personal information of more than 30 million…
A threat actor has made the claim that they have gotten the personal information of 400 million users of Twitter and are now trying to…
A security researcher has discovered a technique to harness the data deletion capabilities of widely used endpoint detection and response (EDR) and antivirus (AV) software…
For reasons of safety, computers that are separated by an air gap are not connected to the Internet or any other network. Typically, they are…
On December 6th, 2022, CloudSEK announced that the firm had been the target of a cyber attack. The internal investigation team discovered throughout the course…
The United States Department of Justice (DoJ) made an announcement on Wednesday, December 14th, regarding the seizure of 48 domains and the prosecution of six…
The National Institute of Standards and Technology (NIST) in the United States has announced that it is time to stop using Secure Hash Technique-1 (SHA-1),…