P&G Confirms data breach but with a cryptic response.

Consumer goods giant Procter & Gamble (P&G) has confirmed a data breach resulting from a zero-day vulnerability in GoAnywhere, a secure file transfer software. The company, which owns major household brands...

What is ScrubCrypt Crypter? How 8220 Gang is using to Evade Detection?

A group of cybercriminals (8220 Gang) has been observed using a new technique to evade detection by security systems and it is concerning to both government and private sector. The gang touches...

Elite Russian Hackers Forum Mazafaka Hacked

Unknown attackers have compromised a prominent underground online criminal forum by the name of Maza, which is the fourth forum to be breached since the beginning of the year. Breaches of other...

Pulse TV reports about 200,000 credit card credentials hacked

PulseTV, a popular e-commerce site in the United States, has revealed a data security incident involving over 200,000 credit card numbers. The firm claims that information such as the customer's name,...

Microsoft has published a report on the rise of Iranian cybercriminals

Over the past few years, Iranian hackers have adapted new tools, techniques, and processes to make their hacking more sophisticated. This has been disclosed recently by the Microsoft Threat Intelligence Center...

Top 6 Ways to Use Cyber Threat Intelligence to Protect Your Organization

In the current technological environment, cyber threat intelligence (CTI) is crucial for defense. By assisting organizations in fending off new threats, this intelligence has already started to alter the way attackers...

Spotify Resets Passwords After Security Bug Exposed Users’ Private Account Information

Spotify said it has reset an undisclosed number of user passwords after blaming a software vulnerability in its systems for exposing private account information to its business partners. The company filed a...

Top 5 Risk Management Strategies for the Tech Supply Chain in 2023

Supply chain safety is vital in a world where technology is constantly developing. Organizations should indeed keep ahead of the curve to protect themselves and outsmart attackers since supply chain attacks and cyber risks are both evolving. What Technology Needs to Know About Supply Chain Attacks Today's data breaches have the ability to bring down even the most respected businesses. Big names in technology have made supply...

The sync issue with WhatsApp-connected devices has been fixed

Users have been experiencing some difficulty in Whatsapp while running it on multiple devices. According to the problem, the communications between the many linked devices are not properly synchronized. To fix...

Colorado university had a data breach which 30,000 students affected

Image courtesy; Saunders Construction The personal information of 30,000 current and former students may have been exposed as a result of a data breach at a Colorado university. The problem was caused...