T-Mobile Investigates Illegal Security Intrusion
It seems like the famous American telco T-Mobile is cursed to suffer constant security incidents. After sustaining a data breach in February 2021, T-Mobile recently...
Everything You Need to Know About the Evolution of Cyberthreats
The theory of evolution proposed by Charles Darwin is based on the concept of change in characteristics of a population over successive generations. An...
Misconfigured Amazon Bucket Exposes Personal Data of Millions of Senior Citizens
Whether it’s critical corporate data or students’ information, threat actors often misuse sensitive data obtained from security data breaches. Recently, security researchers from threat...
Details of 1 Mn International Credit Cards Exposed on Dark Web
Cybercriminals often monitor users’ financial activities to steal information that can be used to open fake accounts. They also trade sensitive financial data such...
“I expect security options to evolve over time with the rollout of 5G”
The potential threat posed by cyberterrorism has crippled both government and security experts. Whether it is cable news, newspapers, websites or social media, “cyberthreat”...
CISA Unveils Joint Cyber Defense Collaborative to Boost Cybersecurity
The increase in the number of cybercriminal groups and ransomware cartels makes it difficult for organizations to stop the threat single-handedly. Cyber collaborations from...
How a 12-Year-Old Path Traversal Flaw Went Unnoticed
Security issues and unpatched vulnerabilities in Wi-Fi devices like routers enable threat actors to infiltrate into other vulnerable IoT devices in the same network....
“I am eagerly waiting for more innovation in incident response and supply chain security”
According to Israel National Cyber Directorate, Israeli cyber companies raised $3.36 billion in the first half of 2021, an amount that constitutes about 41%...
CISA Provides Details on Top Routinely Exploited Vulnerabilities in 2020 and 2021
Organizations can boost their overall cybersecurity posture by regularly updating their network systems and patch vulnerabilities. Understanding how attackers leverage malicious techniques and the...
CISA Launches New Vulnerability Disclosure Policy to Boost Cybersecurity
Despite regular security audits, attackers continue to intrude on business and government networks by exploiting unpatched vulnerabilities. To help federal civilian agencies in the...