Data theft is the act of stealing data stored in business databases, endpoints, and servers. The stolen data can include…
May 08, 2023The Hacker NewsWebinar / Ransomware Are you concerned about ransomware attacks? You’re not alone. In recent years, these…
The Akira ransomware group listed the McGregor company on its victim list. The McGregor cyber attack was conducted early in…
December is here again and the year is coming to a close even though it feels like it was January…
In the ongoing story of the Sun Pharma cyber attack, the alleged hacker group has started leaking stolen data from…
Infamous OilRig Advanced Persistent Threat (APT) group that has been active in the Middle East and Turkiye for over a…
Threat hunting is an essential component of your cybersecurity strategy. Whether you’re getting started or in an advanced state, this…
This guest blog post was authored by Brian Anglin, Application Security Engineer at GitHub and originally published on the GitHub…
Cloud security, ransomware, and poor incident responses have all shaped security discussions in 2017. Another interesting year in security has…
Today’s online environment is a virtual minefield where explosions might happen at any time. Cyberattacks are always lurking in the…
The cybercriminals who breached Taiwanese multinational MSI last month have apparently leaked the company’s private code signing keys on their…
Whether you are a developer or not, we all use APIs (Applications Programming Interfaces). You can use them as a…