News

  • Remote Vulnerabilities in Automobiles

    PRIVACY PRIVACY This group has found a ton of remote vulnerabilities in all sorts of automobiles. It’s enough to make you want to buy a car that is not Internet-connected. Unfortunately, that seems to be impossible. Read More

    Read More

  • 14 UK schools suffer cyberattack, highly confidential documents leaked

    PRIVACY PRIVACY More than a dozen schools in the UK have suffered a cyberattack which has led to highly confidential documents being leaked online by cybercriminals. That’s according to a report from the BBC which claimed that children’s SEN information, child passport scans, staff pay scales and contract details have been stolen by notorious cybercrime…

    Read More

  • Twitter’s mushrooming data breach crisis could prove costly

    PRIVACY PRIVACY Since Elon Musk purchased Twitter in late October, non-stop turmoil and controversy have dogged the company, from massive staff firings and resignations to reputational damage from Musk’s careless and often bizarre tweets. Now, mushrooming concern around a possible data breach stemming from a now-fixed Twitter flaw is poised to drive the company further…

    Read More

  • UK Schools Hit by Mass Leak of Confidential Data

    PRIVACY PRIVACY Confidential data including child passport scans and staff pay scales have been leaked following cyber-attacks in 2022 Read More

    Read More

  • How do the latest iPhone updates address Cybersecurity issues?

    PRIVACY PRIVACY The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Apple is typically known for its minimal design, user-friendly UI, and hardware. But, the success of their products, especially iPhones, has…

    Read More

  • Personal Storage Table Files Accessed in Rackspace Attack

    PRIVACY PRIVACY Incident struck in early December 2022 Read More

    Read More

  • Security Industry Hits Back with MegaCortex Decryptor

    PRIVACY PRIVACY Another ransomware variant bites the dust Read More

    Read More

  • Ransomware Disruption at The Guardian to Last at Least a Month

    PRIVACY PRIVACY Famed newspaper was hit at the end of December Read More

    Read More

  • Attackers create 130K fake accounts to abuse limited-time cloud computing resources

    PRIVACY PRIVACY A group of attackers is running a cryptomining operation that leverages the free or trial-based cloud computing resources and platforms offered by several service providers including GitHub,  Heroku, and Togglebox. The operation is highly automated using CI/CD processes and involves the creation of tens of thousands of fake accounts and the use of…

    Read More

  • Hackers Leverage Compromised Fortinet Devices to Distribute Ransomware

    PRIVACY PRIVACY The findings come from eSentire’s Threat Response Unit Read More

    Read More

News, Advisories and much more

Exit mobile version