Features
Stay up to date on the most recent cybersecurity news. Read the exclusive features that keep you up to date with the happenings in the information security industry.
-
North Korea Now Has A Cyber Army Of 8,400 Hackers
Kim is also allegedly collaborating with his northern Russian friend to further develop their joint malware arsenal by Mihir Bagwe…
-
Daily Blood Tests In London Hospitals Down From 10,000 To 400 Post Synnovis Ransomware Attack
Services including blood transfusions reportedly remain severely disrupted at Guy's and St Thomas' Hospital and King's College Hospital by Mihir…
-
Vermin Hackers Resurface To Target Ukrainian Defense Forces With SPECTR Malware – The Cyber Express
The attackers leveraged the legitimate Syncthing software’s synchronization functionality to download stolen documents, files, passwords and other sensitive information. by…
-
Known Exploited Vulnerabilities (KEV) Catalog By CISA
CISA has urged organizations and all federal agencies to strictly follow the Known Exploited Vulnerabilities catalog as a step against…
-
The Hamas-Israel Cyber War: A Complex Web Of Lies
This analytical piece explores the intricate corridors of the Israel-Hamas-Palestine digital battlefield, where prominent hacker groups and hacktivists converge. by…
-
Cyberattacks On Israel: Lionheart Hackers Declares Warfare
Amid the Israel-Palestine conflict, Lionheart Hackers vowed to target anyone who discusses the Palestinian child casualties. by Ashish Khaitan April…
-
Cyberattacks On Jordan: BlackMaskers Target Crucial Entities
The gravity of the Jordan cyberattacks was highlighted when the hacker group threatened to leak sensitive information pertaining to more…
-
DPRK Cyber Espionage Campaign Targets Think Tanks, Academia, And Media
The campaign is known to be orchestrated by multiple state-sponsored groups namely Kimsuky, Thallium, APT43, Velvet Chollima, and Black Banshee.…
-
Cyberattack On The Indian Air Force: Go Stealer Strikes Again
The modus operandi of this cyber threat unfolds through a series of carefully orchestrated steps. by Ashish Khaitan January 17th,…
-
Government Regulation Of AI Businesses: UK CMA Starts Review
The UK Competition and Markets Authority (CMA) has announced an initial review into the competition and consumer protection considerations surrounding…
-
Void Manticore: Iranian Threat Actor Targeting Israel
The threat actor combines data wiping attacks with psychological warfare by Mihir Bagwe May 20th, 2024 Share on LinkedInShare on…
-
Russian Hackers Use Remote Monitoring Tool To Spy On Ukraine
The malicious scripts are hidden among the legitimate Python code of the “Minesweeper” game from Microsoft by Mihir Bagwe May…
-
Russia Biggest Cyber Threat To Election Security
Espionage and influence operations from Chinese and Iranian state actors also expected to rise as elections approach in key nations…
-
Chinese APT31 State Hackers Targeted Six Australian MPs
Australian security agencies chose not to inform the lawmakers of the cyberattacks that took place in January 2021, despite the…
-
Multiple Cybersecurity Incidents Rock British Columbia Govt
Opposition spars with government in the House for delayed notification and lack of transparency by Mihir Bagwe May 10th, 2024…
-
Russian Hackers Used New Backdoors To Spy On European MFA
Dubbed “LunarWeb” and “LunarMail” these novel backdoors are attributed to the Turla cyberespionage group, believed to be aligned with Russian…
-
Top 5 ISO 27001 Certification Software Tools In 2023
Achieving ISO 27001 certification can provide your business with a competitive edge, as it demonstrates your commitment to protecting sensitive…
-
Top 10 Essential Google Hacks For Cybersecurity Professional
In this comprehensive guide, we will reveal the top 10 Google hacks that every cybersecurity professional should know in 2023. …
-
Insider Threats And Reasons Why They Scar Digital Security
Not just insider threats, organizations must take into consideration the reasons why office insiders have failed as reflected in famous…
-
The Power Of Cybersecurity Journalism During Wartime
Cybersecurity journalism during wartime requires the know-how of some of the latest technology and interest in updating the masses besides…
-
AI Vs. Cyberbullying: Protecting The Vulnerable
In a world where the shadows of cyberbullying loom large, a silent guardian has emerged, and it's not your conventional…
-
Why Companies Are Outsourcing IT Security Services
The allure of IT security outsourcing is undeniable, offering a spectrum of advantages ranging from access to specialized skills to…
-
UTS CyberSecurity Program To Empower Nonprofit Sectors
The program provided thorough training, industry recognition, and job placement support. It offered flexible formats: 24 weeks part-time or 12…
-
China Increasingly Targeting Canadians With Cyber Operations
China's cyber operations surpass other nation-state cyber threats in terms of volume, sophistication, and breadth of targeting, the Cyber Centre…
-
Hackers Likely Accessed Emails In British Columbia Government Breach
22 employee inboxes containing 'sensitive personal information' may have been accessed, authorities said. by Mihir Bagwe June 4th, 2024 Historic…
-
New Chinese Espionage Threat Targeted Southeast Asian Government Organization
A sophisticated Chinese espionage threat group was discovered by Sophos researchers during a threat hunting exercise. by Paul Shread June…
-
US Charged North Korean Job Fraud Nexus Amassing Funds For Nuclear Program
This job fraud nexus scammed more than 300 U.S. companies and accumulated at least $6.8 million by Mihir Bagwe May…
-
Google Supports Establishment Of 15 Cybersecurity Clinics
The tech giant announced its support for the establishment of 15 additional cybersecurity clinics in collaboration with the Consortium of…