Sometimes, misconfigured servers and unsecured databases go unnoticed until security researchers report about them. Bob Diachenko, Head of Security Research at Comparitech, recently discovered an unsecured Elasticsearch server containing a terrorist watchlist of over 1.9 million records. The server was...
It seems like the famous American telco T-Mobile is cursed to suffer constant security incidents. After sustaining a data breach in February 2021, T-Mobile recently announced that it is investigating an unauthorized intrusion that could have allowed access to its...
Even if your organization doesn’t want to address it, there comes a time when every company needs to take a step back, take stock of their tech stack, and ask themselves if it’s time for a change.
By Tim Bandos,...
The theory of evolution proposed by Charles Darwin is based on the concept of change in characteristics of a population over successive generations. An apt example of this is that of the homoserines, where the achievements of the descendants...
Reported as the largest Decentralized Finance (DeFi) Platform hack, Poly Network is the most recent addition to the high value list of victims of crypto attack. It was robbed of around $600 million crypto tokens.
Poly Network is a blockchain...
If the pandemic had played a spoilt sport for ardent Grand Prix fans and deprived them of the adrenaline rush, “The Hungarian Grand Prix 2021” more than made up with the action-packed drama from the word “Go.” Right from...
While ransomware attacks are taking the corporate world by storm, a latest analysis revealed that over 44% of businesses sustained a ransom distributed denial of service (RDDoS) attack in the past 12 months. The Neustar International Security Council (NISC) analysis...
Cyber intrusions by LockBit 2.0 ransomware operators are increasing across the globe. The Australian Cyber Security Centre (ACSC) recently warned about the rise in LockBit 2.0 ransomware attacks in Australia. The latest company to fall victim to LockBit is...
As businesses shift to distributed environments, the threat landscape gets broader, and hackers are now shifting their focus to attacking the systems of remote workers. In this context, the importance of an intrusion detection system or IDS becomes more...
Enhancing security defenses with a robust incident response plan is the only way to become immune to data breaches. From trading in darknet forums to misuse for extortion activities, threat actors leverage stolen/compromised sensitive information in multiple ways. According...