Top 6 Ways to Use Cyber Threat Intelligence to Protect Your Organization
In the current technological environment, cyber threat intelligence (CTI) is crucial for defense. By assisting organizations in fending off new threats, this intelligence has already started to alter the way attackers...
Apple resolved a bug that could cause macOS Monterey to damage Macs equipped with...
Since the introduction of macOS Monterey, numerous Apple users have reported that applying the update bricked their devices. It was unclear what caused the problem until today, when Rene Ritchie got...
Because of a cyber attack, the Canadian government is doubtful how many of its...
Due to the recent cyber attack, the Canadian administration is unsure about the exact number of employees who are double-vaccinated in the country. However, as per Health Minister John Haggie, the...
This Is How Hackers Are Actively Exploiting a Critical Oracle Weblogic Vulnerability
Juniper Threat Labs researchers observed a botnet known as DarkIRC is actively targeting thousands of exposed Oracle WebLogic servers in attacks designed to exploit the CVE-2020-14882 remote code execution (RCE) vulnerability...
Another cyber attack for Acer; Hackers hints of more malicious workers
Taiwanese global electronics giant Acer suffered a cyber attack on its Taiwan servers by the same hacking group responsible for hacking Acer’s Indian servers a few weeks ago.
The authorities got to know about...
The scandal-plagued NSO supports worldwide spyware regulations
On Tuesday, the Israeli firm at the center of the Pegasus spying controversy stated that it would support international legislation to prevent authoritarian countries from exploiting strong spyware like its own.
NSP...
These four scams will empty your bank account
In today's date, new types of internet scams are seen, which you and I are still unaware of. According to a report, 7 out of 10 people in India become victims...
Due to software flaws, Tesla has withdrawn its self-driving beta programme
After customers complained of erroneous collision warnings and other concerns, Tesla Inc (TSLA.O) turned back the newest version of its Full Self-Driving (FSD) beta software on Sunday, less than a day...
Vietnam Government Suffers Supply-Chain Attack: All you need to know
Only a few weeks after the supply chain assault on Able Desktop applications, another similar attack occurred on the website of the Vietnam Government Certification Authority (VGCA): ca.gov.vn.
The attackers changed two...
Babuk ransomware attack; Microsoft Exchange ProxyShell used
Reportedly, a new threat actor is working to hack Microsoft Exchange ProxyShell servers to breach and get access to the company's sensitive information by using ProxyShell vulnerability which is used...