About the last few years, the global pandemic has given cover for a variety of phishing schemes, and the spike in anxiety over the spread of the current COVID-19 version, Omicron, is no exception. Threat actors have seized the …
Panasonic has acknowledged a network vulnerability that allowed thieves to get access to data on a file server. In a short statement issued on Friday, the Japanese consumer electronics behemoth confirmed the compromise (November 26). Panasonic stated it …
According to a story published Friday by Reuters, an unnamed party used NSO Group’s Pegasus malware to infect the Apple iPhones of at least nine US State Department personnel. After receiving a query about the event, NSO Group indicated …
A new rule has been passed by the Chinese government, that claims that every cybersecurity experts have to report any kind of Zero-Day vulnerability they found in software within 2 days to the government. However, the experts have no right to sell …
In this era, mobile technology and smartphone both are trendy terms that often get used. 90% of the population holds the smartphone in their hands. Their purpose is not only to “call” other parties but to use other features like …
A data breach at a third-party provider has potentially exposed the private medical information of patients at Northwestern Memorial HealthCare (NMHC) providers. Unknown actors gained unauthorized access to a databaseowned by Elekta, which provides a cloud-based platform that handles legally-required cancer reporting to …
Ransomware groups periodically disappear, only to reinvent themselves under new branding. Other possibilities include interdiction by law enforcement – US authorities have shown themselves more willing to actively dismantle cybercrime infrastructure of late – or even interference from rival cybercrime gangs. Laying low? The Sodinokibi ransomware, widely …
In an increasingly digitized world, security in the virtual realm becomes more and more of a pressing issue. Especially with the pandemic accelerating the transition of everyday commitments and operations toward the digital realm, the issue of maximum security and …
Imagine intruders break into your home and loiter undetected for months, spying on you and deciding which contents to steal. This in essence is the kind of access that hackers, assumed to be Russian, achieved in recent months at US …
Individual Americans don’t need to worry – at least not immediately – that their personal information was rifled through or stolen in the recently discovered intrusion into U.S. computer systems that officials suspect was the work of Russian hackers, cybersecurity experts …