A cyberattack impacted operations at UK Wirral University Teaching Hospital Pierluigi Paganini November 28, 2024 UK’s Wirral University Teaching Hospital…
UNC2465, a financially motivated threat actor, leverages the SMOKEDHAM backdoor to gain initial access to target networks, which are often…
For the past two days, social media platforms have been abuzz with claims that Microsoft, the software giant, has been…
A researcher has discovered a data broker had stored 644,869 PDF files in a publicly accessible cloud storage container. The…
T-Mobile detected network intrusion attempts and blocked them Pierluigi Paganini November 28, 2024 T-Mobile reported recent infiltration attempts but pointed…
Protect Websites & APIs from Malware Attack Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations,…
In today’s rapidly evolving threat landscape, security leaders must make informed decisions to protect their organizations effectively. The “MITRE Engenuity…
Ransomware groups and state-sponsored actors increasingly exploit data exfiltration to maximize extortion and intelligence gains by leveraging a mix of…
Summary Massive Data Leak: Propertyrec exposed over 644,000 records, totaling 713 GB of sensitive data. Sensitive Information: Leaked data includes…
In October 2023 I wrote an opinion article extolling the virtues of Gen AI for the Higher Education sector: Generative…
Western Australia will hire a chief data officer and create its own scheme for mandatory reporting of notifiable data breaches…
North Korean threat actors target software developers with weaponized Javascript projects that include BeaverTail malware deployed via NPM packages. It…











