Have Any Questions?
Call Now +353 1-211-8666
Technology

Category

Cybercriminals have learned how to use copyright infringement notices as bait in phishing scams. This time, Sophos observed threat actors targeting Instagram users.Have you ever posted a photo on Instagram that wasn’t yours, maybe to get a bit more followers? If so, a message like this one below might scare you into taking action.“We recently...
T-Mobile suffered from a data breach in a series of SIM swapping attacks, potentially leaving sensitive information of a small number of customers exposed. The incident comes just a few months after a massive breach affected 53 million customers back in August.According to the T-MO report, unauthorized activity on some of the customers’ accounts may...
Security teams at companies large and small are scrambling to patch a previously unknown vulnerability called Log4Shell, which has the potential to let hackers compromise millions of devices across the internet.If exploited, the vulnerability allows remote code execution on vulnerable servers, giving an attacker the ability to import malware that would completely compromise machines.The vulnerability...
Amazon Web Services (AWS) has provided an explanation as to what caused the outage that downed parts of its own services, as well as the third-party websites and online platforms that utilize AWS. In a post on the AWS website, the company explains that an automated process caused the outage, which began around 10:30AM ET...
The change is likely a result of the fallout from Israeli company NSO Group allowing authoritarian regimes to use its Pegasus spyware.The Israeli Ministry of Defense reduced the number of countries that Israeli companies can export cyber tools to from 102 to 37, Calcalist, a local business paper, reports.The updated list of countries Israeli companies...
British journalists have located Yevgeniy Polyanin, a 28-year-old hacker wanted by the FBI for deploying the REvil/Sodinokibi ransomware.The hacker was found to be living in a $380,000 house in Barnaul, a Russian city housing 610,000 residents in the Altai region, dailymail.com reports.Journalists photographed the hacker driving his $74,000 Toyota Land Cruiser 200. A BMW worth...
Evidence suggests that IKEA’s on-premises Microsoft Exchange servers may have been compromised by threat actors.Furniture giant IKEA confirmed that it was hit by a wave of email reply-chain cyberattacks that targeted the company’s internal mailboxes, as well as those of IKEA’s suppliers and business partners, BleepingComputer reports.Attackers carry out reply-chain attacks by gaining access to...
As the year is coming to a close, it’s time to take a look at the evolution of the ransomware landscape in 2022. Security experts believe that the level of sophistication and scale of cyberattacks will continue to increase, causing record-breaking financial losses.Ransomware will become more aggressive and widespread, while threat actors behind major ransomware...
Web registrar and hosting company GoDaddy submitted a filing to the Securities and Exchange Commission (SEC) on Monday, revealing that email addresses of up to 1.2 million Managed WordPress customers of the company had been accessed by an unauthorized third party.GoDaddy said the breach, perpetrated by the attackers via a compromised password, was initially discovered...
A flaw in chips made by MediaTek, a Taiwanese tech giant, potentially allowed threat actors to steal audio and eavesdrop on Android users.Research published by Israeli cybersecurity company Check Point exposed a flaw in MediaTek’s chips, which would have allowed hackers to listen in on audio on Android devices.MediaTek is the largest supplier of smartphone...
1 2 3 4 5