Facebook Takes Down Hundreds of Fake Accounts Under Coordinated Inauthentic Behavior
Facebook has taken down two separate networks that originated from China and the Philippines for violating its Coordinated Inauthentic Behavior (CIB) policy. In an...
Multiple Banks and Telecoms in Hungary Affected in a DDoS Attack
Operations at multiple banks and telecommunication service providers in Hungary were disrupted due to a distributed-denial-of-service (DDoS) attack launched from servers located in Russia,...
Attackers Target Govt. Computers at the National Informatics Centre
More than 100 computer systems of the National Informatics Centre (NIC) in India were compromised in a suspected malware attack. The NIC is part...
Zhenhua Data Leak: Is China Spying and Collecting Data on Indians?
Chinese firm Zhenhua Data Information Technology has been accused of collecting data on millions of people worldwide. The Chinese tech company has reported links...
China Unwraps its Global Data Security Initiative
In the recent past, China has been heavily scrutinized by countries like the U.S., India, and Australia for waging a cyberwar against their public,...
U.S. Issues a Code Red for a New Strain of “Taidoor” Virus from China
The U.S. law enforcement agencies like the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Defense...
Continuous Tests in Cybersecurity Controls and Process
Much is said about the importance of security testing, regardless of what we call them, be it Pentest, Ethical Hacking, Red Team or whatever....
South Korea Penalizes TikTok for Mishandling Child Data
Following in the footsteps of the U.S. and India, South Korea now seems to have tightened its grip around the China-based social media company,...
Oh Yes! It’s War, the Other War, the Cyber War!
The tensions between India and China are escalating by the day over the border dispute between the two nations in the Ladakh region. However,...
Ramsay: A New Cyber Espionage Toolkit to Steal Data from Air‑Gapped Networks
Security researchers from ESET recently discovered a new cyber espionage campaign codenamed “Ramsay” which is designed to steal sensitive documents from air‑gapped networks. Ramsay...