134 customers exposed in support system hack
Okta says attackers who breached its customer support system last month gained access to files belonging to 134 customers, five of them later being targeted…
Okta says attackers who breached its customer support system last month gained access to files belonging to 134 customers, five of them later being targeted…
Nov 03, 2023NewsroomOnline Security / Malware Compromised Facebook business accounts are being used to run bogus ads that employ “revealing photos of young women” as…
The notorious North Korean hacking group Lazarus has used new macOS and Windows malware in recent attacks, security researchers warn. In one of the attacks,…
Nov 03, 2023NewsroomCloud Security / Linux The threat actors linked to Kinsing have been observed attempting to exploit the recently disclosed Linux privilege escalation flaw…
The question of “Why invest in quantum computing now?” is one every CIO should be asking. When compared to the evolutionary path of traditional computing,…
LockBit ransomware group has set its sights on MicroTrain Technologies in yet another cyber assault. The MicroTrain Cyberattack has exposed various documents, including enrollment forms,…
Singapore’s health sector has suffered a massive setback from cyberattacks. Numerous major public hospitals, polyclinics, and healthcare centers in Singapore have experienced a long outage…
North Korean hackers are using novel MacOS malware named KandyKorn to target blockchain engineers of a cryptocurrency exchange platform. The attack By impersonating blockchain engineering…
Malicious exploitation of an Apache ActiveMQ vulnerability tracked as CVE-2023-46604 started at least two weeks prior to patches being released, according to managed detection and…
Russian FSB arrested Russian hackers who supported Ukrainian cyber operations Pierluigi Paganini November 03, 2023 The FSB arrested two Russian hackers who are accused of…
Social media platforms offer financially motivated threat actors opportunities for large-scale attacks by providing a vast user base to target with:- These platforms allow attackers…
James Christie’s devastating analysis of how the Law Commission misrepresented the work of engineers and computer scientists (myself included) to overturn the basic statutory requirement…