Search Results for: breached Blog Post Data Breach: Attackers Breached Systems of United Nations October 4, 2021 As the shocking news recently emerged that hackers breached the computer networks of the United Nations, it sent shockwaves across... Blog Post Lazarus Hacking Group Set IT Supply Chain Attacks in Motion November 25, 2021 North Korean-backed Lazarus hacking group that inclines to infiltrate the military has now shifted its focus on new targets. It... Blog Post Anonymous In a Hacking Rampage Against Russia March 2, 2022 Less than a week after announcing a cyber offensive against Russia, Anonymous has attacked over 300 Russian targets. So far, the targets... Blog Post Ransomware Gangs Now Calling And Emailing Victims February 15, 2022 It seems like the days of short and clear threat messages are slowly becoming old-fashioned, as ransomware gangs are becoming... Blog Post Critical Infrastructure: A Prime Target in CyberWarfare March 4, 2022 The U.S. Department of Homeland Security (DHS) categorizes critical infrastructure as physical or virtual systems or assets so vital to... Blog Post Hackers stole Mars missions 500Mb of data and breached NASA’s satellite dish network June 27, 2019 The U.S. National Aeronautics and Space Administration (NASA) this week confirmed that its Jet Propulsion Laboratory (JPL) has been hacked.... Blog Post Banks On Alert Though Seemingly The Financial Sector Is Not A Specific Focus Of The Ongoing Hacking Campaign January 13, 2021 The ongoing hacking campaign has sent shock waves across the U.S. government and the private sector. Meanwhile, as per bank... Blog Post FamousSparrow Advanced Persistent Threat Group Rushes to Hotels, Businesses, and Governments. October 11, 2021 Recently, researchers at an internet security company named ESET discovered new cyber-espionage and advanced persistent threat group FamousSparrow. Although the... Blog Post What is a Denial of Service (DoS) Attack? March 3, 2020 A Denial of Service (DoS) attack is a method used to disrupt legitimate users’ access to a target network or... Blog Post Moving Your Business to the Cloud? Cybercriminals are Hot on Your Heels October 13, 2021 Although cloud adoption has been an inevitable imperative for some time and a driving force in changing how businesses operate,... Blog Post Verizon’s Visible Wireless Carrier Confirms Credential-Stuffing Attack November 23, 2021 In an official Reddit announcement made on October 13th, Visible confirmed that some of its user accounts were high-jacked. The... Blog Post Purple Fox Malware Now Evolves to Spread Itself Across Windows Machines April 9, 2021 Purple Fox has incorporated a new technique into its arsenal, allowing it to spread itself across windows machines. Essentially, Purple... Blog Post Canadian Government’s GCKey Service Targeted by Cyberattacks and Used to Steal COVID-19 Relief Benefits August 25, 2020 Recently, the Canadian government services were targeted by cyberattacks used to steal COVID-19 relief payments. The attacks breached the Canadian... Blog Post The Lorenz Ransomware Gang Demand High Ransoms June 25, 2021 The Lorenz Gang Over the past few months, the Lorenz ransomware threat (the encryptor is believed to be the same... Blog Post Zero-days in Accellion file transfer app used for data theft March 4, 2021 Back in December 2020, a software vendor Accellion informed about an actively exploited zero-day vulnerability in its File Transfer Appliance...
Blog Post Data Breach: Attackers Breached Systems of United Nations October 4, 2021 As the shocking news recently emerged that hackers breached the computer networks of the United Nations, it sent shockwaves across...
Blog Post Lazarus Hacking Group Set IT Supply Chain Attacks in Motion November 25, 2021 North Korean-backed Lazarus hacking group that inclines to infiltrate the military has now shifted its focus on new targets. It...
Blog Post Anonymous In a Hacking Rampage Against Russia March 2, 2022 Less than a week after announcing a cyber offensive against Russia, Anonymous has attacked over 300 Russian targets. So far, the targets...
Blog Post Ransomware Gangs Now Calling And Emailing Victims February 15, 2022 It seems like the days of short and clear threat messages are slowly becoming old-fashioned, as ransomware gangs are becoming...
Blog Post Critical Infrastructure: A Prime Target in CyberWarfare March 4, 2022 The U.S. Department of Homeland Security (DHS) categorizes critical infrastructure as physical or virtual systems or assets so vital to...
Blog Post Hackers stole Mars missions 500Mb of data and breached NASA’s satellite dish network June 27, 2019 The U.S. National Aeronautics and Space Administration (NASA) this week confirmed that its Jet Propulsion Laboratory (JPL) has been hacked....
Blog Post Banks On Alert Though Seemingly The Financial Sector Is Not A Specific Focus Of The Ongoing Hacking Campaign January 13, 2021 The ongoing hacking campaign has sent shock waves across the U.S. government and the private sector. Meanwhile, as per bank...
Blog Post FamousSparrow Advanced Persistent Threat Group Rushes to Hotels, Businesses, and Governments. October 11, 2021 Recently, researchers at an internet security company named ESET discovered new cyber-espionage and advanced persistent threat group FamousSparrow. Although the...
Blog Post What is a Denial of Service (DoS) Attack? March 3, 2020 A Denial of Service (DoS) attack is a method used to disrupt legitimate users’ access to a target network or...
Blog Post Moving Your Business to the Cloud? Cybercriminals are Hot on Your Heels October 13, 2021 Although cloud adoption has been an inevitable imperative for some time and a driving force in changing how businesses operate,...
Blog Post Verizon’s Visible Wireless Carrier Confirms Credential-Stuffing Attack November 23, 2021 In an official Reddit announcement made on October 13th, Visible confirmed that some of its user accounts were high-jacked. The...
Blog Post Purple Fox Malware Now Evolves to Spread Itself Across Windows Machines April 9, 2021 Purple Fox has incorporated a new technique into its arsenal, allowing it to spread itself across windows machines. Essentially, Purple...
Blog Post Canadian Government’s GCKey Service Targeted by Cyberattacks and Used to Steal COVID-19 Relief Benefits August 25, 2020 Recently, the Canadian government services were targeted by cyberattacks used to steal COVID-19 relief payments. The attacks breached the Canadian...
Blog Post The Lorenz Ransomware Gang Demand High Ransoms June 25, 2021 The Lorenz Gang Over the past few months, the Lorenz ransomware threat (the encryptor is believed to be the same...
Blog Post Zero-days in Accellion file transfer app used for data theft March 4, 2021 Back in December 2020, a software vendor Accellion informed about an actively exploited zero-day vulnerability in its File Transfer Appliance...