logo-default
  • HOME
  • ABOUT US
  • LITIGATION SUPPORT SERVICES
  • CYBER SECURITY SERVICES
  • BLOG
Return to previous page
Home Archive by category "Cybersecurity Compliance"

Page 89

Read more

US Government Ordered to Urgently Patch Apple Zero-Day Bugs

September 12, 2023 / 38 / 0
[ad_1] The US Cybersecurity and Infrastructure Security Agency (CISA) has given federal agencies less than a month to update their iOS, iPadOS and macOS devices in order to mitigate the risk of spyware attacks. CISA added two recently discovered Apple zero-day flaws to its Known Exploited... Continue reading
Read more

Pentagon Urges Collaboration in Cyber Defense

September 12, 2023 / 73 / 0
[ad_1] In a discussion at the FedTalks event in Washington last Thursday, Leslie A. Beavers, principal deputy chief information officer at the Pentagon, underscored the imperative need for collaboration in countering emerging cyber-threats. Beavers cautioned that these challenges are not limited to the government but... Continue reading
Read more

Lazarus Group Targets macOS in Supply Chain Assault

September 11, 2023 / 35 / 0
[ad_1] Cybersecurity firm ESET has detected a significant supply chain attack targeting macOS devices. The Lazarus Group, known for its advanced cyber operations, was reportedly behind this breach. The attack, which began in March 2023, involved compromising the X_TRADER software and 3CX phone system apps,... Continue reading
Read more

Cuba Ransomware Group Unleashes Undetectable Malware

September 11, 2023 / 41 / 0
[ad_1] Security researchers at Kaspersky have unveiled research into the activities of the notorious ransomware group known as Cuba. According to a new advisory published by Kaspersky earlier today, the notorious cyber-criminal gang has been targeting organizations worldwide, spanning various industries. The technical write-up shows... Continue reading
Read more

Ransomware Attack Wipes Out Four Months of Sri Lankan Government Data

September 11, 2023 / 38 / 0
[ad_1] Investigations have begun into a massive ransomware attack that has affected Sri Lanka’s government cloud system, Lanka Government Cloud (LGC). The investigation is being conducted by the Sri Lanka Computer Emergency Readiness Team and Coordination Center (CERT|CC). Sri Lanka’s Information and Communication Technology Agency... Continue reading
Read more

Pro Russia AlphV Claims Cyber Attacks On Victorian Companies

September 11, 2023 / 48 / 0
[ad_1] Notorious Russian ransomware group AlphV has claimed to have launched cyber attacks on Victorian companies. Their claims extend further, stating that they have access to 4.95 terabytes of company data from this campaign of cyber attacks. The ransomware group, operating from the shadows of... Continue reading
Read more

Who Are The Hackers Targeting India G20 Summit

September 11, 2023 / 52 / 0
[ad_1] In a concerning development preceding the G-20 India Summit 2023, multiple hacker groups have declared their intent to launch cyber attacks on India, uniting under the banner of #OPIndia. This coordinated call for collective G20 cyber attacks, driven by anti-India sentiments, raises alarms as... Continue reading
Read more

Dymocks Data Breach May Have Compromised Customer Data

September 10, 2023 / 55 / 0
[ad_1] Dymocks, a prominent bookstore chain, has faced a cyber attack, resulting in a data breach of multiple customers. The company has alerted its valued customers to a new Dymocks data breach that may have exposed their personal information on the dark web.  On Friday,... Continue reading
Read more

How A Lost Phone Unleashes Cybersecurity Chaos

September 10, 2023 / 52 / 0
[ad_1] In an age dominated by technology, our lives have become increasingly interconnected with the internet, offering both convenience and unforeseen circumstances. In ‘Unlocked,’ a gripping Korean crime mystery thriller by director Kim Tae-joon, the film delves into the unsettling aftermath of cyber security breaches,... Continue reading
Read more

Deceptive Honeypot For Hackers By Cybersecurity Researchers

September 10, 2023 / 56 / 0
[ad_1] In a strategic move to outwit cybercriminals, a dedicated team of cybersecurity researchers devised an operation centered around the creation and strategic storage of fabricated personal data within the domain of the digital cloud. The bait was set, the trap laid, and the clock... Continue reading
Next Page »

Search