Recently, Infosys, a reputable Information technology (IT) service provider, reported about a “disruptive cybersecurity event” in their US subsidiary, IMS,…
By Ambarish Kumar Singh, Chief Information Security Officer (CISO) at Godrej & Boyce Zero Day terminology is very popular in the…
An analysis of the sample data shared by the hackers revealed, among other details, personal and insurance-related information belonging to…
ZDI discloses four zero-day flaws in Microsoft Exchange Pierluigi Paganini November 03, 2023 Researchers disclosed four zero-day flaws in Microsoft…
RSA-2048 is a widely used encryption scheme based on the RSA (Rivest–Shamir–Adleman) cryptosystem. The “2048” in RSA-2048 denotes the key…
Over the past couple of months, ransomware attacks have been escalating as new operations launch, old ones return, and existing…
Okta customer support system breach impacted 134 customers Pierluigi Paganini November 03, 2023 Threat actors who breached the Okta customer…
A former Dutch cybersecurity professional was sentenced to four years in prison after being found guilty of hacking and blackmailing…
KandyKorn is a stealthy backdoor designed to extract data, file uploading/downloading, directory listing, process termination, secure deletion, and command execution….
Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals. But the bad…
By Mary Blackowiak, Director of Product Management and Development, AT&T Business Whether at the grocery store, eating dinner at a…
Allied Pilots Association (APA), a labor union representing 15,000 American Airlines pilots, disclosed a ransomware attack that hit its systems…