Verkada to pay $2.95M for security failures leading to breaches
02
Sep
2024

Verkada to pay $2.95M for security failures leading to breaches

The Federal Trade Commission (FTC) proposes a $2.95 million penalty on security camera vendor Verkada for multiple security failures that enabled…

New ManticoraLoader : Malware Attacking Citrix Users To Steal Data
02
Sep
2024

New ManticoraLoader Malware Attacking Citrix Users To Steal Data

DeadXInject, the group behind AresLoader and AiDLocker ransomware, is offering a new Malware-as-a-Service (MaaS) called ManticoraLoader.  Advertised on underground forums…

Naveen Goud
02
Sep
2024

Google issues warning on Russian Cyber Attack on Safari and Chrome browsers

Google, the prominent American technology conglomerate, has recently issued a significant warning to users of Safari and Chrome browsers. This…

RansomHub Ransomware Group
02
Sep
2024

RansomHub Ransomware Group Targets 210 Victims Across Critical Sectors

Threat actors linked to the RansomHub ransomware group encrypted and exfiltrated data from at least 210 victims since its inception…

New Voldemort Malware Using Google Sheets To Store Stolen Data
02
Sep
2024

New Voldemort Malware Using Google Sheets To Store Stolen Data

Hackers abuse Google Sheets to covertly store and transmit stolen data or execute malicious scripts, taking advantage of its trusted…

Global Phishing Scam Hits Canadian Pizza Chains for Credit Card Data
02
Sep
2024

Global Phishing Scam Hits Canadian Pizza Chains for Credit Card Data

Scammers are using domain spoofing, phishing and other tactics to steal customer information from pizza restaurants, especially in Canada. Discover…

Lockbit gang claims the attack on the Toronto District School Board
02
Sep
2024

Lockbit gang claims the attack on the Toronto District School Board

Lockbit gang claims the attack on the Toronto District School Board (TDSB) Pierluigi Paganini September 02, 2024 The Toronto District…

Hacktivist Group Exploit WinRAR Vulnerability to Encrypt Windows & Linux
02
Sep
2024

Hacktivist Group Exploit WinRAR Vulnerability to Encrypt Windows & Linux

The hacktivist group Head Mare has leveraged a vulnerability in WinRAR to infiltrate and encrypt systems running on Windows and…

The Internet of Things Technological Perspective
02
Sep
2024

The Internet of Things Technological Perspective

The Internet of Things (IoT) is a boom which has come with the ongoing industrial progress and revolution offering something…

Storage technology explained: Kubernetes, containers and persistent storage
02
Sep
2024

Storage technology explained: Kubernetes, containers and persistent storage

Containerisation is synonymous with cloud-native application development, and Kubernetes is key among container orchestration platforms available. In this article, we look…

Malicious NPM Packages
02
Sep
2024

North Korean Hackers Attack Developers Via Malicious NPM Packages

Hackers often target NPM packages to inject malicious code into widely used libraries, enabling them to reach a massive developer…

Why Incident Response Planning is Critical for Cybersecurity Resilience
02
Sep
2024

Why Incident Response Planning is Critical for Cybersecurity Resilience

Cyber threats are inevitable, making preparedness necessary. In 2023, the average cost of a data breach reached $4.45 million. Implementing…