How to Launch a Successful ICO: 2024 Guide
16
Jul
2024

How to Launch a Successful ICO: 2024 Guide

Dive into our step-by-step guide, explore the benefits, navigate legal complexities, and execute a successful token sale with precision. A…

Strategic Defence Review must emphasise cyber security, says industry
16
Jul
2024

Strategic Defence Review must emphasise cyber security, says industry

IT security leaders have called on the new Labour government to make enhancing the UK’s ability to counter and defend…

Trello
16
Jul
2024

Email addresses of 15 million Trello users leaked on hacking forum

A threat actor has released over 15 million email addresses associated with Trello accounts that were collected using an unsecured API…

Rite Aid Data Breach – 2.2 Million Customer Personal Data Exposed
16
Jul
2024

Rite Aid Data Breach – 2.2 Million Customer Personal Data Exposed

Rite Aid, the third-largest drugstore chain in the United States, has disclosed that a data breach in June 2024 exposed…

Iran's MuddyWater APT targets Saudis and Israelis with BugSleep Backdoor
16
Jul
2024

Iran’s MuddyWater APT targets Saudis and Israelis with BugSleep Backdoor

New Backdoor ‘BugSleep’ Discovered in MuddyWater Phishing Attacks. Cybersecurity researchers uncover a custom-made backdoor used by the notorious MuddyWater hacking…

Fujitsu analyst gave witness statements when more qualified colleagues refused
16
Jul
2024

Fujitsu analyst gave witness statements when more qualified colleagues refused

A former Fujitsu IT security analyst provided witness statements about the Horizon IT system to courts using information from more…

Philippine Department Of Migrant Workers Switches To Manual Systems After Attack
16
Jul
2024

Philippine Department Of Migrant Workers Switches To Manual Systems After Attack

The Philippine Department of Migrant Workers (DMW) has taken swift action to protect the personal data of overseas Filipino workers…

LI.FI Protocol Hack: Attackers Exploit Multiple Flaws, Stolen .7M in Crypto
16
Jul
2024

LI.FI Protocol Hack: Attackers Exploit Multiple Flaws

The LI.FI Protocol, a cross-chain bridging and swapping platform, was the victim of a sophisticated cyber-attack that stole approximately $9.7…

Iraqi Hackers Exploit PyPI to Infiltrate Systems Through Python Packages
16
Jul
2024

Iraqi Hackers Exploit PyPI to Infiltrate Systems Through Python Packages

Python packages are being used to steal data from developers and companies. Learn about the extensive cybercriminal operation involving an…

Incubator Plexal heads to Singapore for CyberBoost
16
Jul
2024

Incubator Plexal heads to Singapore for CyberBoost

East London innovation and startup hub Plexal has partnered with the Cyber Security Agency (CSA) of Singapore, the Asian state’s…

CISA adds OSGeo GeoServer GeoTools bug to its Known Exploited Vulnerabilities catalog
16
Jul
2024

CISA adds OSGeo GeoServer GeoTools bug to its Known Exploited Vulnerabilities catalog

CISA adds OSGeo GeoServer GeoTools bug to its Known Exploited Vulnerabilities catalog Pierluigi Paganini July 16, 2024 U.S. Cybersecurity and…

Windows 11
16
Jul
2024

Microsoft announces new Windows ‘checkpoint’ cumulative updates

Microsoft will introduce checkpoint cumulative updates starting in late 2024 for systems running devices running Windows Server 2025 and Windows…