cyber security
32 Million Sensitive Records Exposed From Service Management Provider
A significant data breach occurred at ServiceBridge, a technology company specializing in field service management. An unsecured database housing a substantial volume of sensitive business information was exposed to...
Cyber Attack
Panamorfi TCP flood DDoS Attack Targeting Jupyter Notebooks
An attacker, identified as Yawixooo, leveraged a publicly accessible Jupyter Notebook honeypot as an initial access vector.The honeypot's exposure to the internet-enabled Yawixooo to...
Cyber Crime
Emojis Are To Express Emotions, But CyberCriminals For Attacks
There are 3,664 emojis that can be used to express emotions, ideas, or objects in digital communication.While seemingly harmless, criminals are increasingly exploiting emojis...
Cyber Attack
DoppelGänger Attack: Malware Routed Via News Websites And Social Media
A Russian influence campaign, DoppelGänger, leverages fake news websites (typosquatted and independent) to spread disinformation, undermining support for Ukraine.Structura and SDA are running...
Cyber Crime
Hacker Pleads Guilty For Stealing 132,000+ Users Data
Robert Purbeck, a hacker known as "Lifelock" and "Studmaster," hacked into the computer servers of the City of Newnan, a medical clinic in Griffin,...
Cyber Security News
New Acoustic Keyboard Side Channel Attack Let Attackers Steal Sensitive Data
In recent years, personal data security has surged in importance due to digital device usage. Side-channel attacks exploit system side effects to gather information. Electronic...
cyber security
NSA Details Seven Pillars Of Zero Trust
The National Security Agency (NSA) issued a Cybersecurity Information Sheet (CSI) that discusses limiting adversary lateral movement within an organization's network to access sensitive data...
cyber security
Open Source Security: Trends and Predictions for 2024
Open source security refers to the practice of ensuring that open source software (OSS) is free from vulnerabilities that malicious actors could exploit. It...
Business
Responding To And Recovering From Physical Security Breaches
Unfortunately, data breaches and similarly related physical security threats are something of an eventuality in the modern world.Recently published data reveals 28% of...
Cyber AI
ChatGPT and Cybersecurity: Top 5 Cyber Security Risks of ChatGPT
ChatGPT has been met with skepticism and optimism in equal measures in the cybersecurity realm. IT professionals leverage this chatbot to write firewall rules,...
cyber security
BFSI Sector at the Forefront of Cyberattacks
In recent years, the BFSI Sector (Banking, Financial Services, and Insurance) has become a primary target for cyber attackers.A 2022 report by IBM revealed...