Cyber Security
On June 21, 2023, hackers broke into LetMeSpy’s servers and stole private data. Following the hack, the attackers were able to obtain unauthorized access...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
On June 21, 2023, hackers broke into LetMeSpy’s servers and stole private data. Following the hack, the attackers were able to obtain unauthorized access...
The Colorado Department of Higher Education (CDHE) discloses a massive data breach impacting students, past students, and teachers after suffering a ransomware attack in...
Researchers from the Technical University of Berlin have developed a method to jailbreak the AMD-based infotainment systems used in all recent Tesla car models...
The four-year implementation plan stresses development, recruitment, and retention to fill needed cyber positions. Nearly a quarter of the Pentagon’s cyber jobs are unfilled,...
The Cybersecurity and Infrastructure Security Agency’s 2024-2026 cybersecurity roadmap focuses on public-private partnerships and using metrics to gauge the effectiveness of cybersecurity measures. The...
Hackers actively leverage LOLBAS (Living-Off-the-Land Binaries-And-Scripts), it’s a popular methodology that is used by threat actors for exploiting legit tools for hiding the illicit actions performed...
Threat actors are evolving their techniques and tools at a rapid pace that is completely changing the current threat scenario. BlueCharlie is a Russia-linked threat...
There is a critical vulnerability in Ivanti’s MobileIron Core 11.2 version that could allow a malicious actor to gain unauthorized access to restricted functions....
The House Committee on Oversight and Accountability is investigating how the State and Commerce departments responded to a cyberattack that successfully gained access to...
There have been several reports recently about cybercriminals using AI-powered tools for malicious purposes which can give a paradise of information for nefarious purposes....
Recent Comments