Cyber threats cast shadow over 2024 elections
Considering that 2024 is a historic year for elections – with an estimated half of the world’s population taking part in democratic votes – this…
Considering that 2024 is a historic year for elections – with an estimated half of the world’s population taking part in democratic votes – this…
Feb 16, 2024NewsroomCybersecurity / Data Breach The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has revealed that an unnamed state government organization’s network environment was…
In the late 1990s, the outcome of a battle between two factions within the Post Office triggered the IT problems that, combined with corporate malfeasance,…
Washington County recently faced a cyberattack by Russian hackers targeting the government and courthouse. To swiftly halt the attack and regain control of the county’s…
Llamaya, a prominent mobile telephony company operating under the MASMOVIL Group in Spain, has reportedly fallen victim to a massive data breach. The threat actor…
Russia-linked Turla APT uses new TinyTurla-NG backdoor to spy on Polish NGOs Pierluigi Paganini February 16, 2024 Russia-linked APT group Turla has been spotted targeting…
Security researchers Mathy Vanhoef and Héloïse Gollier, have recently uncovered several critical vulnerabilities in the Wi-Fi authentication protocols used in modern WPA2/3 networks collaborating with…
Outlook has been discovered to have an interesting vulnerability while handling specific hyperlinks, which was found to be exploited by threat actors in the wild.…
The Department of State, in its ongoing efforts to combat cybercrime, has announced a $10 million reward for information leading to the apprehension of ALPHV,…
Here’s a look at the most interesting products from the past week, featuring releases from Appdome, Center for Internet Security, Cyberhaven, LOKKER, Sumsub, and CompliancePro…
Feb 16, 2024NewsroomBotnet / Network Security The U.S. government on Thursday said it disrupted a botnet comprising hundreds of small office and home office (SOHO)…
Imagine a cascading blackout, disrupted pipelines, or manipulated manufacturing processes – all orchestrated through a cyberattack. This chilling reality paints a stark picture of the…