cyber security
Dell Hacked – Attackers Stolen 49 Million Customers Personal Information
Dell Technologies recently disclosed a data breach involving a company portal that contained limited customer information related to purchases.The breach exposed customer names,...
cyber security
Volkswagen Group’s Systems Hacked: 19,000+ Documents Stolen
The Volkswagen Group has fallen victim to a sophisticated hacking incident, with over 19,000 sensitive documents stolen.Investigations point towards a possible involvement of Chinese...
Cyber Security News
The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy
Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and turning them into bots for the Faceless proxy service.TheMoon...
CVE/vulnerability
CISA & FBI Warns that Hackers Use SQL Injection Vulnerabilities to hack Servers
Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have warned technology manufacturers and their customers about the persistent threat...
Cyber Security News
DHCP Hacked to Escalate Privileges in Windows Domains
Security researchers have uncovered a sophisticated method of exploiting the Dynamic Host Configuration Protocol (DHCP) administrators group to escalate privileges within Windows domains.This...
Data Breach
Fujitsu Hacked – Attackers Infected The Company Computers with Malware
Fujitsu Limited announced the discovery of malware on several of its operational computers, raising concerns over the potential leak of files containing personal and...
Cyber Attack
Stanford University Hack Exposes Over 27K People’s Data
The Stanford University data breach involved a ransomware attack by the Akira ransomware gang.The breach occurred between May 12, 2023, and September 27,...
Cyber Security News
Nigerian National Pleads Guilty for Hacking Business & Individual Emails
Henry Onyedikachi Echefu, a 32-year-old Nigerian national, has admitted to his role in a sophisticated business email compromise (BEC) scheme and money laundering activities....