Cybercrime

How Did a Cyberattack Push Wirral Hospitals Back to Pen and Paper?
Malware & Threats How Did a Cyberattack Push Wirral Hospitals Back to Pen and Paper?

In an unsettling development, Wirral University Teaching Hospital NHS Trust in North West England experienced a critical cybersecurity incident that forced its hospitals to revert to pen-and-paper operations. This unsettling event was initially detected as suspicious activity, prompting the

Cyberattack on Bologna FC by RansomHub Highlights Security Gaps
Malware & Threats Cyberattack on Bologna FC by RansomHub Highlights Security Gaps

In the modern, increasingly connected world, the digital vulnerability of organizations has become a glaring Achilles' heel, with cybercriminals continuously evolving their tactics to exploit any security gaps. The recent cyberattack on Bologna FC, a professional football club in Italy,

Columbus Data Breach Exposes Over 500,000, City Faces Criticism
Data Protection & Privacy Columbus Data Breach Exposes Over 500,000, City Faces Criticism

The City of Columbus, Ohio, has found itself at the center of significant controversy following a severe data breach caused by a ransomware attack. Initially downplayed by city officials, who stated that the compromised data was either "encrypted or corrupted," the breach's true

How Can Major Cyber Breaches Like Transak’s Be Prevented in the Future?
Data Protection & Privacy How Can Major Cyber Breaches Like Transak’s Be Prevented in the Future?

The recent data breach at Miami-based cryptocurrency payment processor Transak exposed sensitive customer information of over 92,000 individuals due to a phishing attack on an employee’s laptop, revealing significant vulnerabilities in corporate security defenses. This incident, which compromised d

Styra Patches NTLM Hash Leak Vulnerability in Open Policy Agent
Infrastructure & Network Security Styra Patches NTLM Hash Leak Vulnerability in Open Policy Agent

In recent developments, Styra has patched a crucial security flaw identified in its Open Policy Agent (OPA) that could have allowed remote attackers to compromise NTLM credentials. Discovered by cybersecurity researchers and designated CVE-2024-8260, this vulnerability necessitated immediate

Are Third-Party Partnerships Creating Cybersecurity Vulnerabilities?
Infrastructure & Network Security Are Third-Party Partnerships Creating Cybersecurity Vulnerabilities?

In an increasingly interconnected world where organizations rely significantly on third-party partnerships, the recent cyberattack targeting Israeli firms has illuminated unforeseen vulnerabilities within these alliances. The attack utilized phishing emails that masqueraded as alerts from the

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later