Cybersecurity

  • TECH NEWSUnveiling the Sony Data Breach A Comprehensive Analysis

    Sony Data Breach A Closer Look at MOVEit Vulnerability

    Sony data breach a closer look at MOVEit vulnerability. In the ever-evolving landscape of cybersecurity, one name has recently dominated headlines – Sony. The tech giant confirmed a data breach that has sent shockwaves through the industry. In this article, we will delve into the details of the breach, the culprits behind it, and the implications it holds for cybersecurity…

    Read More »
  • TECH NEWSFBI and European Dismantle Global Malware Network Qakbot

    FBI and European Dismantle Global Malware Network Qakbot

    FBI and European partnership dismantled global malware network Qakbot. In a groundbreaking victory against cybercrime, the FBI, in collaboration with European law enforcement agencies, has successfully dismantled a major global malware network that has been operational for over 15 years. This significant achievement comes as a severe setback to cybercriminals who utilized the malware agent known as Qakbot for a…

    Read More »
  • WEBLeaseweb Takes Swift Action to Restore Service After Cyberattack

    Leaseweb Takes Swift Action to Restore Service After Cyberattack

    In a recent turn of events, Leaseweb, one of the world’s prominent cloud and hosting providers, has found itself grappling with the aftermath of a cyberattack. The company took immediate and resolute measures to mitigate the impact of the attack on its critical systems. On the night of August 22, the vigilant monitoring systems of Leaseweb detected an anomalous surge…

    Read More »
  • WEBAnonfiles Shuts Down Amidst Rampant Abuse and Threats

    Anonfiles Shuts Down Amidst Rampant Abuse and Threats

    Anonfiles shuts down operations amidst rampant abuse and threats. Anonfiles, a well-known anonymous file-sharing platform, has taken the decision to cease its operations due to a significant surge in misuse by its users. This service, which permitted individuals to share files anonymously while refraining from recording user actions, unfortunately evolved into a central hub for threat actors to exchange purloined…

    Read More »
  • TECH NEWSHackers Target Auction House Network for $120,000

    Hackers Target Auction House Network for $120,000

    A significant breach has rattled the cybersecurity realm, as hackers demand a staggering $120,000 in exchange for access to a major auction house’s compromised network. This revelation comes on the heels of a diligent investigation by Flare, a respected threat intelligence company. The breach was brought to light when researchers stumbled upon an alarming advertisement on a hacker forum, offering…

    Read More »
  • TECH NEWSMerlin Toolkit Exploited in Targeted Attacks on State Entities

    Merlin Toolkit Exploited in Targeted Attacks on State Entities

    Ukrainian authorities have issued a stern caution regarding a series of assaults directed at governmental bodies through the utilization of the ‘Merlin’ open-source post-exploitation toolkit. ‘Merlin’, crafted in the Go programming language, stands as a versatile toolkit accessible on GitHub, meticulously designed for red team operations within the realm of cybersecurity. The toolkit, ‘Merlin’, encompasses a repertoire of functionalities encompassing…

    Read More »
  • TECH NEWSAPT29's Midnight Blizzard Shakes Global Governments

    APT29’s Midnight Blizzard Shakes Global Governments

    APT29’s Midnight Blizzard shakes global governments. According to a recent cybersecurity discovery, Microsoft Teams was used by Russian state-linked hackers APT29, also known as Cosy Bear, to conduct a highly sophisticated and covert phishing attack on government agencies all across the world. The “Midnight Blizzard” attack, which was launched by Russia’s SVR, a foreign intelligence service, aimed to compromise critical…

    Read More »
  • GOOGLEGoogle Issues Email Alert for Inactive Accounts

    Google Issues Email Alert for Inactive Accounts

    Google warns users through email before deleting inactive accounts. Google has announced a policy change that will take effect on December 1st, 2023, and may have significant effects on its users. Google has started issuing warning emails to consumers with inactive account. You may want to pay attention to this if you have an account that has been inactive for…

    Read More »
  • APPSHow SafeChat Became a Gateway for Data Theft

    How SafeChat Became a Gateway for Data Theft

    In a recent cyber attack, Android users were the target of a devious tactic used by hackers who took advantage of a phoney app called “SafeChat,” obtaining private information from well-known messaging services like Signal and WhatsApp. The ‘Bahamut’ APT hacking gang from India is the outfit behind this espionage. In order to compromise the target’s smartphone, they use spear…

    Read More »
  • macOSRealst Malware Hits macOS Sonoma

    Realst Malware Hits macOS Sonoma

    In the wake of the recent ShadowVault incident, a new threat known as “Realst Malware” has emerged, posing significant risks to Windows and macOS users, including those on macOS 14 Sonoma. Realst, an infostealer malware, has gained notoriety for infiltrating fake blockchain games orchestrated by cybercriminals in a massive campaign. The discovery of Realst was credited to the diligent efforts…

    Read More »
Back to top button