Medusa Group Claims ICDO Cyber Attack, Names 3 Victims
The Medusa ransomware group has added the International Civil Defense Organization (ICDO) to its list of targeted victims. The hacker collective has set a deadline…
The Medusa ransomware group has added the International Civil Defense Organization (ICDO) to its list of targeted victims. The hacker collective has set a deadline…
Networking appliances maker Juniper Networks has announced patches for four vulnerabilities in the J-Web interface of Junos OS, which could be combined for unauthenticated, remote…
IT leaders strive to enable cross-functional teams that can work effectively across organisational and geographic boundaries, using their preferred tooling. Amazing things happen when the…
The ALPHV ransomware group has claimed the Seiko data breach. This claim comes in the wake of a prior cyber incident that occurred in July…
Tesla has disclosed a data breach impacting roughly 75,000 people, but the incident is the result of a whistleblower leak rather than a malicious cyberattack.…
White hat hackers at the recent hacking conference Def Con demonstrated how to spoof an Apple device and trick users into sharing their sensitive data.…
Abstract: The topic of scientific works on the implementation of modern technologies and systems of automated management of the enterprise, its resources and technical means…
Nuance Communications, Inc, the American multinational computer software technology corporation acquired by Microsoft in 2022, was targeted by cybercriminals. The ransomware group Cl0p named Nuance…
Israel and US government agencies announced the BIRD Cyber Program, an investment of roughly $4M in projects to enhance the cyber resilience of critical infrastructure.…
In a startling turn of events, a thriving fashion brand based in Hanoi, Vietnam, known as “The Bad God,” has become the unfortunate victim of…
Aug 21, 2023THNCyber Threat / Malware The threat actors behind the HiatusRAT malware have returned from their hiatus with a new wave of reconnaissance and…
In an era where technology plays an indispensable role in every aspect of our lives, the protection of sensitive information has become a paramount concern.…