News

Cyber Attack

Prepare Now for Cyberattacks- Don’t Wait

In present times, you never know what you are going to wake up to. While the countries were slowly recovering from the effects of the pandemic, the new socio-politico conflict between Russia and Ukraine has spurred new strain worldwide. Amidst …

Burner Phone

What is a Burner Phone?

A burner is a low-cost mobile phone that is intended to be used once and then destroyed. Burners are purchased using prepaid minutes and do not require a contract. Although prepaid phones are sometimes referred to as “burners,” it is …

Top 10 Cybersecurity Threat Predictions for 2022

Top 10 Cybersecurity Threat Predictions for 2022

The 21st century began with many technological advancements, innovative software, new tools, and resources. However, it comes with its own set of risks and dangers. Cybersecurity is often a hot topic in the tech industry and for the right reasons. …

Log4J Flaw

Log4j Cyber Security Vulnerability Sends Shock Waves Around the World

Khonsari ransomware deployed as payload post-exploitation Bitdefender and other security experts have stated that the Khonsari ransomware family is now being delivered as payload post-exploitation, as reported by Microsoft. We’ve seen a small number of instances of this malware being …

Twitter photo video consent ban

Twitter bans sharing photos and videos of people without their consent

Twitter has announced that it will ban sharing photos and videos of people without their consent, the company posted in a blog. Twitter says that the new policy is in line with its commitment to protecting people’s privacy. The change …

Apple AirTag

Apple allows users to scan for nearby rogue AirTags

Apple will now be allowing its ‘Find My’ feature to scan and report nearby AirTags that might be rogue tags placed for tracking purposes, according to the latest iOS 15.2 beta released for developers on Monday. Apple calls the additional …

Robinhood Breached

Robinhood suffers data breach affecting up to 7 million customers

Stock and crypto trading platform, Robinhood, has revealed that they have suffered a “security incident” where an unauthorized third party obtained access to personal information about their customers. Robinhood confirmed the attack in a recent blog post and stated that …

Kaseya REvil arrested

6 Million Dollars Seized from REvil, Kaseya Hacker Arrested

A Ukrainian citizen, believed to be the architect behind the Kaseya hack in July, has been charged by the United States Department of Justice (DOJ) with leading a group that infected computers worldwide with ransomware. $6.1 million was also seized …

Facebook Facial Recognition

Facebook Shutting Down Controversial Face Recognition Program

Facebook is shutting down its controversial face recognition program. The company has vowed to delete over a BILLION templates of people’s faces scanned and uploaded by Facebook users for tagging friends in photos. This decision comes after months of criticism …

Windows 11 privacy concerns

Windows 11 Privacy Issues – What you need to know

Windows 11 has been out for a few weeks now and many Windows 10 users are finally upgrading. Windows is often seen as the most popular desktop operating system in the world, but does Windows 11 have any privacy concerns? …

Twitch.TV source code and data leaked by hacker

Twitch source code and data leaked by hacker

Online streaming service Twitch.TV has been the victim of a hacking incident. Twitch has confirmed the latest hack of 128GB of data which has been leaked online. Twitch.TV is a website that allows people to broadcast gaming-related content in real-time.  …

Facebook Instagram Whatsapp Major Outage

Facebook, Instagram and WhatsApp all offline in major outage

Kaseya sent out an urgent warning to customers of a potential attack on its VSA tools, which tens of thousands of IT support companies around the world use.

AUKUS: The New Security Alliance and Its Implication on Cybersecurity

AUKUS: The New Security Alliance and Its Implication on Cybersecurity

In an interconnected world primarily driven by globalization, it is rare to see countries that function solely on domestic capabilities. Thanks to interconnectivity, there are always some alliances to look up, treaties to analyze, and global affairs to watch out …

Identify and Disrupt

Identify and Disrupt: How Australian police are hacking into your digital world.

Every day we seem to be edging closer to a 1984 totalitarian-style world. Australia has just taken a giant step towards enabling a totalitarian rule over its citizens. The Australian Parliament passed new legislation that gives the federal police virtually …

Australia accuses China of cyber attack

Australian government accuses China of cyber attack

New Zealand calls out China over “smash-and-grab” cyberattacks The New Zealand Government’s Minister for Communications Security Bureau (GCSB), Andrew Little, has added to the chorus of global condemnation over China’s “smash-and-grab” state-sponsored cyberattacks against New Zealand interests. “New Zealand is …

East Germany council declares cyber catastrophe

East Germany council declares cyber-catastrophe

An East Germany district council has declared a cyber-catastrophe after a cyberattack paralyzed its computer systems. The hackers managed to take down the IT systems, with the council confirming its systems will remain offline for the next week with no …

Iran train cyberattack transport system hacked

Cyberattack hits Iran’s railway transport hub

A cyberattack has brought Iran’s railway transportation system to a halt and created commuter chaos as trains across the country were canceled or delayed. Hackers managed to breach the display board system at train stations across the country, replacing the …

Ransomware Attack

Kaseya MSP software hit by a zero-day ransomware attack

Kaseya sent out an urgent warning to customers of a potential attack on its VSA tools, which tens of thousands of IT support companies around the world use.

PrintNightMare - windows server print spooler exploit

Windows print spooler flaw lets users compromise windows servers

A proof of concept for a new critical windows security vulnerability was published to GitHub before quickly taken down. However, the code was online long enough for cybersecurity researchers to copy and begin testing. The bug has been given the …

Rockyou2021 Password Dump

Hackers dump 8.4 billion passwords in compilation called RockYou2021

A new compilation of passwords collected from data breaches has been released and dubbed ‘Rockyou2021’ after the 2009 password compilation dump ‘RockYou.’ The collection was released for download on a popular forum for hackers. The new compilation contains 8.4 billion …

Scroll to Top