Hacking

HPE is investigating claims of a new security breach

Hewlett Packard Enterprise (HPE) is investigating a new data breach after a threat actor claimed to have stolen data on…

2 years ago

Experts warn of a surge of attacks targeting Ivanti SSRF flaw

The Ivanti SSRF vulnerability tracked as CVE-2024-21893 is actively exploited in attacks in the wild by multiple threat actors. The Ivanti…

2 years ago

How to hack the Airbus NAVBLUE Flysmart+ Manager

Airbus Navblue Flysmart+ Manager allowed attackers to tamper with the engine performance calculations and intercept data. Flysmart+ is a suite…

2 years ago

Crooks stole $25.5 million from a multinational firm using a ‘deepfake’ video call

Scammers stole HK$200 million (roughly $25,5 million) from a multi-national company using a deepfake conf call to trick an employee…

2 years ago

Software firm AnyDesk disclosed a security breach

Remote desktop software company AnyDesk announced that threat actors compromised its production environment. Remote desktop software company AnyDesk announced on…

2 years ago

The ‘Mother of all Breaches’: Navigating the Aftermath and Fortifying Your Data with DSPM

What is Data Security Posture Management (DSPM) and how you can mitigate the risks of data leaks such as the…

2 years ago

US government imposed sanctions on six Iranian intel officials

The US government issued sanctions against six Iranian government officials linked to cyberattacks against critical infrastructure organizations.  The U.S. Treasury…

2 years ago

A cyberattack impacted operations at Lurie Children’s Hospital

A cyber attack forced Lurie Children's Hospital in Chicago to take IT systems offline with a severe impact on its…

2 years ago

AnyDesk Incident: Customer Credentials Leaked and Published for Sale on the Dark Web

Resecurity identified bad actors offering a significant number of AnyDesk customer credentials for sale on the Dark Web. Such information…

2 years ago

Mastodon fixed a flaw that can allow the takeover of any account

A vulnerability impacting the decentralized social network Mastodon can be exploited by threat actors to impersonate and take over any…

2 years ago

This website uses cookies.