Cybercrime

Is UnitedHealth Cyber Breach Retraction a Tactic Shift?
Data Protection & Privacy Is UnitedHealth Cyber Breach Retraction a Tactic Shift?

In a surprising development within the realm of digital security, a prominent group of cybercriminals has recently recanted their earlier assertion of having exfiltrated a vast haul of data, amounting to 8 terabytes, from the healthcare giant UnitedHealth. This volte-face by the hacking syndicate

How Did the LoanDepot Breach Affect 17M Customers?
Data Protection & Privacy How Did the LoanDepot Breach Affect 17M Customers?

Fallout from the Cyberattack Immediate Impact on Customers LoanDepot has faced a catastrophic cyberattack that compromised the personal data of approximately 17 million customers. This breach has exposed sensitive information such as names, Social Security numbers, birth dates, and detailed

How Can Bosnians Protect Themselves from Online Banking Fraud?
Data Protection & Privacy How Can Bosnians Protect Themselves from Online Banking Fraud?

The banking sector in Bosnia and Herzegovina is sounding the alarm over a spike in cyber fraud, particularly as the COVID-19 pandemic has driven a shift toward digital transactions. Cybercriminals are becoming more effective at masking their intentions, leading to an increase in victims who

How is the Google-CSA Partnership Enhancing Singapore's Cybersecurity?
Infrastructure & Network Security How is the Google-CSA Partnership Enhancing Singapore's Cybersecurity?

The partnership between global tech giant Google and Singapore's Cyber Security Agency (CSA) is a game-changer in the fight against cybercrime in the city-state. With the introduction of cutting-edge methods to detect and combat online threats, especially in mobile security, this alliance is a

Cybercriminals Use Legit Email Tools to Spread Revenge RAT Malware
Malware & Threats Cybercriminals Use Legit Email Tools to Spread Revenge RAT Malware

Cybersecurity experts have uncovered a sly cyberattack tactic where hackers deploy Revenge RAT malware hidden within reputable email tools like smtp-validator and Email to SMS to bypass security measures. By exploiting the trust associated with legitimate software, these attackers dramatically

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later