Kerala Cyber Xtractors List Victims
02
May
2023

Kerala Cyber Xtractors List Victims

Cyber attacks on Malaysia by Indian fringe groups continue. In an operation named #OP_PAYBACK_MALAY, a group of Indian hackers have…

Anonymous Sudan Cooperating With Turk Hack Team
02
May
2023

Anonymous Sudan Cooperating With Turk Hack Team

Anonymous Sudan Cooperating with Turk Hack Team! The pro-Russian threat actor Anonymous Sudan has announced a collaboration with the Turk…

T-mobile Hacked
02
May
2023

T-mobile Hacked – Over 37M Sensitive Data Exposed

T-Mobile claims it discovered that a bad actor had gained limited access to information from a small number of T-Mobile…

LINE on Securing the Application Development Lifecycle with Bug Bounties
02
May
2023

LINE on Securing the Application Development Lifecycle with Bug Bounties

Based in Japan, LINE Corporation is dedicated to the mission of “Closing the Distance,” bringing together information, services and people….

Hackers Claim To Download KYC
02
May
2023

Hackers Claim To Download KYC

Weeks after Indian furniture and appliance rental service RentoMojo confirmed a data breach, hackers claimed to have added the company…

Serverless vs Cloud vs On-prem
02
May
2023

Serverless vs Cloud vs On-prem

Server architecture can differ in a lot of ways, but the three main categories would be on-prem, cloud and serverless….

Data Breach lawsuits against companies increasing in the year 2023
02
May
2023

Data Breach lawsuits against companies increasing in the year 2023

Companies that fail to protect their customers’ information are likely to face lawsuits in the year 2023, as impacted customers…

02
May
2023

Data-driven insights help prevent decisions based on fear

Organizations have strengthened security measures and become more resilient, but threat actors are still finding ways through, according to BakerHostetler….

Vulnerabilities
02
May
2023

Active Exploitation of TP-Link, Apache, and Oracle Vulnerabilities Detected

May 02, 2023Ravie LakshmananVulnerability / Cyber Threat The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three flaws to…

5 Learnings From A Conversation With OP Financial Group's CISO And @mrtuxracer
02
May
2023

5 Learnings From A Conversation With OP Financial Group’s CISO And @mrtuxracer

On 20 January, HackerOne’s CEO, Marten Mickos, sat down for a chat with European hacker, Julien Ahrens a.k.a @mrtuxracer, and…

02
May
2023

The costly threat that many businesses fail to address

Insider attacks such as fraud, sabotage, and data theft plague 71% of U.S. businesses, according to Capterra. These schemes can…

Meet the Hacker: EdOverflow, motivated by community and knowledge sharing
02
May
2023

Meet the Hacker: EdOverflow, motivated by community and knowledge sharing

EdOverflow is known for contributing a bunch of stuff: active in the community, one of the people behind security.txt –…