Today's Featured

Latest Security News

Aviation Equipment Major ASCO Victim of Ransomware Attack

A Step-By-Step Guide on How To Remove Ransomware?

Prevention is always recommended when it comes to ransomware infections. Nevertheless, there are numerous ways to recover lost data whenever a device is compromised. Learn how to remove ransomware in…

Read More
Beware of 10 Past Ransomware Attacks 1

Guide to Remove Ransomware

Ransomware is malicious software that encrypts your files and demands a fee in exchange for access. This type of malware is now the most profitable form of cybercrime since victims…

Read More
New Ransomware Attack – Texas Government agencies become Victim

Best Ransomware Protection

Ransomware attacks targeting governments, businesses, hospitals, and private individuals are rising. It has become a vast online issue that affects individuals and businesses alike. You are neither safe on your…

Read More
security

Swimlane introduces an OT security automation ecosystem

The launch of a security automation solution ecosystem for operational technology (OT) environments was announced on Monday by Swimlane, a provider of security orchestration, automation, and response (SOAR). For this…

Read More
Massive Data Breach

CISA Urges Organizations to Implement Phishing-Resistant MFA

By deploying phishing-resistant multi-factor authentication (MFA) and number matching in MFA applications, organisations may defend themselves against phishing and other attacks, according to recommendations provided by the US Cybersecurity and…

Read More
security

Critical ConnectWise Vulnerability Affects Thousands of Internet-Exposed Servers

ConnectWise, a company that makes software for IT management, made an announcement on Friday about updates that address a significant vulnerability. According to cybersecurity professionals, this weakness leaves thousands of…

Read More
Minnesota Man Charged for Employing ‘Hacker for hire’ to Target Local Business Website

After hackers threatened to target celebrities, Medibank confirmed the impact of a larger cyberattack

On Tuesday, Australian private insurer Medibank stated that a recent disclosed cyberattack affects more customers’ data than first believed. Days after hackers vowed to target celebrities, the announcement was made….

Read More
WordPress Login Bug 2

WordPress Security Update 6.0.3 Patches 16 Vulnerabilities

This week, WordPress 6.0.3 began to be distributed. The most recent security update fixes 16 flaws. In addition to addressing open redirect, data exposure, cross-site request forgery (CSRF), and SQL…

Read More
toyota

Toyota Discloses Data Breach Impacting Source Code

Toyota, a Japanese automaker, has identified a security breach involving source code stored on GitHub that may have given third parties access to some 300,000 customer email addresses. According to…

Read More
700000 Snail Mails Sent to Victims Of The 2018 Zbot Trojan Virus min

A critical vulnerability in vm2 Allow a Remote Attacker to Escape The Sandbox

Vm2, a JavaScript sandbox package that receives more than 16 million downloads each month, provides the synchronous execution of untrusted code within a single process. Security researchers at Oxeye found…

Read More
Hostinger Resets User Passwords after data breach

123K Individuals Data Exposed in Tucson Data Breach

The Tucson Data Breach is a recent data breach that occurred in the city of Tucson, Arizona. The breach affected approximately 1.2 million individuals, who had their personal information exposed….

Read More
samsung

Samsung Sued Over Recent Data Breaches

Two Samsung customers, who are being represented by Clarkson Law Firm, have launched a class action lawsuit against the electronics maker for the two data breaches it had in 2022….

Read More
Microsoft Hesitates About Machine Learning Can Also Be Used By Hackers

Vulnerabilities in the iBoot Power Distribution Unit Let Hackers Remotely Shut Down Devices

Researchers found serious flaws in Dataprobe’s iBoot power distribution unit (PDU), which may be used by hostile parties to remotely hijack the device and shut down any connected devices, possibly…

Read More

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password

Register