Home Blog Page 60
Reported as the largest Decentralized Finance (DeFi) Platform hack, Poly Network is the most recent addition to the high value list of victims of crypto attack. It was robbed of around $600 million crypto tokens. Poly Network is a blockchain...
If the pandemic had played a spoilt sport for ardent Grand Prix fans and deprived them of the adrenaline rush, “The Hungarian Grand Prix 2021” more than made up with the action-packed drama from the word “Go.” Right from...
While ransomware attacks are taking the corporate world by storm, a latest analysis revealed that over 44% of businesses sustained a ransom distributed denial of service (RDDoS) attack in the past 12 months. The Neustar International Security Council (NISC) analysis...
Cyber intrusions by LockBit 2.0 ransomware operators are increasing across the globe. The Australian Cyber Security Centre (ACSC) recently warned about the rise in LockBit 2.0 ransomware attacks in Australia. The latest company to fall victim to LockBit is...
As businesses shift to distributed environments, the threat landscape gets broader, and hackers are now shifting their focus to attacking the systems of remote workers. In this context, the importance of an intrusion detection system or IDS becomes more...
Enhancing security defenses with a robust incident response plan is the only way to become immune to data breaches. From trading in darknet forums to misuse for extortion activities, threat actors leverage stolen/compromised sensitive information in multiple ways. According...
Bringing the technical expertise of both public and private organizations will help mitigate security gaps and boost the overall cybersecurity posture in the country. In an effort to resolve the cybersecurity challenges posed by the nation’s critical infrastructure, the...
In this day and age, your identity is a shared asset. Be it a calling card, passport or license -- it’s the means by which you, the user, and private or public enterprises can safeguard and secure each other. By...
Australians have become a target for different kinds of cyberattacks lately. The Australian Competition and Consumer Commission (ACCC) reported an 84% surge in identity theft scams, 75% in phishing scams, and a significant increase in remote access scams in the...
Whether it’s critical corporate data or students’ information, threat actors often misuse sensitive data obtained from security data breaches. Recently, security researchers from threat intelligence firm WizCase uncovered a massive data breach affecting a misconfigured Amazon S3 bucket owned...