Cyber Attack

ShinyHunters Hacker group Claims to Have Hacked Pizza Hut Australia customer dataShinyHunters Hacker group Claims to Have Hacked Pizza Hut Australia customer data

ShinyHunters Hacker group Claims to Have Hacked Pizza Hut Australia customer data

Pizza Hut Australia has fallen victim to a cyberattack resulting in unauthorized access and potential compromise of customer data.  DataBreaches…

2 years ago
Forever 21 Systems Hacked: 500,000+ Users AffectedForever 21 Systems Hacked: 500,000+ Users Affected

Forever 21 Systems Hacked: 500,000+ Users Affected

In a recent development, Forever 21 disclosed a cyber incident that came to light on March 20, 2023, affecting a…

2 years ago
Paramount Media Hacked: Attackers Obtain Access to User Personal InformationParamount Media Hacked: Attackers Obtain Access to User Personal Information

Paramount Media Hacked: Attackers Obtain Access to User Personal Information

In a shocking turn of events, Paramount Media recently fell victim to a significant data breach, leading to the unauthorized…

2 years ago
Hackers Exploiting Juniper RCE Flaw Following PoC ReleaseHackers Exploiting Juniper RCE Flaw Following PoC Release

Hackers Exploiting Juniper RCE Flaw Following PoC Release

There were multiple vulnerabilities in the Juniper SRX and EX Series, which were reported previously. These vulnerabilities have a medium…

2 years ago
What are Brute Force Attacks, and How to Protect Your APIs Against them?What are Brute Force Attacks, and How to Protect Your APIs Against them?

What are Brute Force Attacks, and How to Protect Your APIs Against them?

Brute force attacks have been one of the most common attack types. In Q1 2022, brute force made up 51%…

2 years ago
Kali Linux 2023.3 Released: What’s New!Kali Linux 2023.3 Released: What’s New!

Kali Linux 2023.3 Released: What’s New!

Kali Linux 2023.3 is now available, and it includes a variety of new packages and tools, as well as the…

2 years ago
How Malware Sandboxes Strengthen Your CybersecurityHow Malware Sandboxes Strengthen Your Cybersecurity

How Malware Sandboxes Strengthen Your Cybersecurity

Cyberattacks are becoming increasingly sophisticated, threatening organizations' critical infrastructure and sensitive data more than ever. Core solutions such as SIEMs…

2 years ago
3,000+ Android Malware Using Unique Compression Methods to Avoid Detection3,000+ Android Malware Using Unique Compression Methods to Avoid Detection

3,000+ Android Malware Using Unique Compression Methods to Avoid Detection

Android Smartphones play a vital role in our daily lives, as they help us stay connected and, not only that,…

2 years ago
Cyber Criminals Attacking Web Services to Breach OrganisationsCyber Criminals Attacking Web Services to Breach Organisations

Cyber Criminals Attacking Web Services to Breach Organisations

Web servers are a prime target for threat actors due to their open and volatile nature. However, these servers must…

2 years ago
Researchers Uncover Series of Ransomware Attacks that Follow Same PatternResearchers Uncover Series of Ransomware Attacks that Follow Same Pattern

Researchers Uncover Series of Ransomware Attacks that Follow Same Pattern

Ransomware groups often recycle tools, techniques, and procedures. Even some of them also provide playbooks for affiliates as well. Numerous…

2 years ago