Hacking firm I-Soon data leak revealed Chinese gov hacking capabilitiesHacking firm I-Soon data leak revealed Chinese gov hacking capabilities

Hacking firm I-Soon data leak revealed Chinese gov hacking capabilities

1 year ago

Recently the leak of a collection of files apparently stolen from the Chinese government hacking contractor, I-Soon, exposed Chinese hacking…

IntelBroker claimed the hack of the Los Angeles International AirportIntelBroker claimed the hack of the Los Angeles International Airport

IntelBroker claimed the hack of the Los Angeles International Airport

1 year ago

The popular hacker IntelBroker announced that it had hacked the Los Angeles International Airport by exploiting a flaw in one…

LockBit is back and threatens to target more government organizationsLockBit is back and threatens to target more government organizations

LockBit is back and threatens to target more government organizations

1 year ago

The LockBit gang is back and set up a new infrastructure after the recent attempt by law enforcement to disrupt…

A cyber attack hit the Royal Canadian Mounted PoliceA cyber attack hit the Royal Canadian Mounted Police

A cyber attack hit the Royal Canadian Mounted Police

1 year ago

A cyber attack hit the Royal Canadian Mounted Police (RCMP), the federal and national law enforcement agency of Canada. The…

Crooks stole $10 million from Axie Infinity co-founderCrooks stole $10 million from Axie Infinity co-founder

Crooks stole $10 million from Axie Infinity co-founder

1 year ago

Crooks stole nearly $10 million from the wallet of one of the co-founders of the video game Axie Infinity and…

Security Affairs newsletter Round 460 by Pierluigi Paganini – INTERNATIONAL EDITIONSecurity Affairs newsletter Round 460 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs newsletter Round 460 by Pierluigi Paganini – INTERNATIONAL EDITION

1 year ago

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…

Apple created post-quantum cryptographic protocol PQ3 for iMessageApple created post-quantum cryptographic protocol PQ3 for iMessage

Apple created post-quantum cryptographic protocol PQ3 for iMessage

1 year ago

Apple announced the implementation of a post-quantum cryptographic protocol called PQ3 will be integrated into iMessage. Apple announced a new post-quantum cryptographic…

Russian hacker is set to face trial for the hack of a local power gridRussian hacker is set to face trial for the hack of a local power grid

Russian hacker is set to face trial for the hack of a local power grid

1 year ago

A Russian national (49) was charged with a cyberattack on a local power plant that caused a widespread blackout. The…

230K individuals impacted by a data breach suffered by Telco provider Tangerine230K individuals impacted by a data breach suffered by Telco provider Tangerine

230K individuals impacted by a data breach suffered by Telco provider Tangerine

1 year ago

Australian telecommunications provider Tangerine disclosed a data breach that impacted roughly 230,000 individuals. Tangerine suffered a data breach that exposed…

Microsoft released red teaming tool PyRIT for Generative AIMicrosoft released red teaming tool PyRIT for Generative AI

Microsoft released red teaming tool PyRIT for Generative AI

1 year ago

Microsoft has released an open-access automation framework, called PyRIT, to proactively identify risks in generative artificial intelligence (AI) systems. Microsoft has released…