Australian Electoral Commission starts moving out of NEXTDC
17
Jul
2024

Australian Electoral Commission starts moving out of NEXTDC – Cloud – Networking

The Australian Electoral Commission is moving out of NEXTDC and into a CDC Data Centres facility, with plans to have…

Self-proclaimed bitcoin inventor faces UK criminal probe
16
Jul
2024

Self-proclaimed bitcoin inventor faces UK criminal probe – Software

An Australian computer scientist who claimed he invented bitcoin faces a criminal investigation in Britain for alleged perjury after he…

Encryption Algorithms
16
Jul
2024

What are the Encryption Algorithms Used in Modern Malware?

Malware authors increasingly rely on encryption to obfuscate their code and evade detection by security tools such as YARA, Suricata,…

How to Launch a Successful ICO: 2024 Guide
16
Jul
2024

How to Launch a Successful ICO: 2024 Guide

Dive into our step-by-step guide, explore the benefits, navigate legal complexities, and execute a successful token sale with precision. A…

Strategic Defence Review must emphasise cyber security, says industry
16
Jul
2024

Strategic Defence Review must emphasise cyber security, says industry

IT security leaders have called on the new Labour government to make enhancing the UK’s ability to counter and defend…

Trello
16
Jul
2024

Email addresses of 15 million Trello users leaked on hacking forum

A threat actor has released over 15 million email addresses associated with Trello accounts that were collected using an unsecured API…

Rite Aid Data Breach – 2.2 Million Customer Personal Data Exposed
16
Jul
2024

Rite Aid Data Breach – 2.2 Million Customer Personal Data Exposed

Rite Aid, the third-largest drugstore chain in the United States, has disclosed that a data breach in June 2024 exposed…

Iran's MuddyWater APT targets Saudis and Israelis with BugSleep Backdoor
16
Jul
2024

Iran’s MuddyWater APT targets Saudis and Israelis with BugSleep Backdoor

New Backdoor ‘BugSleep’ Discovered in MuddyWater Phishing Attacks. Cybersecurity researchers uncover a custom-made backdoor used by the notorious MuddyWater hacking…

Fujitsu analyst gave witness statements when more qualified colleagues refused
16
Jul
2024

Fujitsu analyst gave witness statements when more qualified colleagues refused

A former Fujitsu IT security analyst provided witness statements about the Horizon IT system to courts using information from more…

Philippine Department Of Migrant Workers Switches To Manual Systems After Attack
16
Jul
2024

Philippine Department Of Migrant Workers Switches To Manual Systems After Attack

The Philippine Department of Migrant Workers (DMW) has taken swift action to protect the personal data of overseas Filipino workers…

LI.FI Protocol Hack: Attackers Exploit Multiple Flaws, Stolen .7M in Crypto
16
Jul
2024

LI.FI Protocol Hack: Attackers Exploit Multiple Flaws

The LI.FI Protocol, a cross-chain bridging and swapping platform, was the victim of a sophisticated cyber-attack that stole approximately $9.7…

Iraqi Hackers Exploit PyPI to Infiltrate Systems Through Python Packages
16
Jul
2024

Iraqi Hackers Exploit PyPI to Infiltrate Systems Through Python Packages

Python packages are being used to steal data from developers and companies. Learn about the extensive cybercriminal operation involving an…