Cyberattack On ChatGPT Claimed By Anonymous Sudan
Anonymous Sudan, a self-proclaimed activist group, allegedly launched a cyberattack on OpenAI, the artificial intelligence (AI) giant, on February 14, 2024, resulting in disruptions to…
Anonymous Sudan, a self-proclaimed activist group, allegedly launched a cyberattack on OpenAI, the artificial intelligence (AI) giant, on February 14, 2024, resulting in disruptions to…
A network outage at Data Action (DA) is causing app and internet banking problems for a number of Australian banks and credit unions, including NAB-owned…
Digital forensics plays a crucial role in analyzing and addressing cyberattacks, and it’s a key component of incident response. Additionally, digital forensics provides vital information…
Feb 15, 2024NewsroomThreat Intelligence / Vulnerability Microsoft on Wednesday acknowledged that a newly disclosed critical security flaw in Exchange Server has been actively exploited in…
Ubank, which is a NAB’s digital-only bank, is blaming an unspecified “systems outage” for its app and online banking services being down since just before…
Wesfarmers has welcomed improving digital performance, with its OnePass membership program growing and losses from its troubled Catch operating shrinking. Wesfarmers’ OneDigital operation – home…
Trans-Northern Pipelines (TNPI) has confirmed its internal network was breached in November 2023 and that it’s now investigating claims of data theft made by the…
Threat actors exploit HijackLoader because it is a powerful tool for injecting malicious code into legitimate processes, enabling stealthy execution of payloads. This technique helps…
There’s an unhealthy obsession with companies looking for a way to measure developer productivity. The desire to measure productivity is understandable; senior leaders have been…
The LockBit ransomware gang claims to be behind the recent cyberattack on Fulton County, Georgia, and is threatening to publish “confidential” documents if a ransom…
Threat actors hunt for ways to exploit vulnerabilities by employing tactics from technical zero-days to broad phishing. Social engineering blends with commodity malware on high-traffic…
For over a decade, the iTnews Benchmark Awards have given end user organisations, their IT leaders and teams an opportunity to gain recognition for their…