The incident that shook Baltimore on March 26, 2024, when a cargo vessel collided with the Baltimore Bridge, resulting in its collapse into the Patapsco River, has sparked widespread speculation and concern. In the early hours of March 27, 2024,…
Category: Cybersecurity Insiders
Ransomware attack on Big Issue and University of Winnipeg
The Qilin Ransomware group is under scrutiny for breaching the servers of the UK-based newspaper ‘The Big Issue Group.’ Reports indicate that the perpetrators successfully accessed confidential data from the victim and are now holding the entire database hostage, encrypting…
Has the third world war started with Baltimore Bridge Collapse with Cyber Attack
The incident that shook Baltimore on March 26, 2024, when a cargo vessel collided with the Baltimore Bridge, resulting in its collapse into the Patapsco River, has sparked widespread speculation and concern. In the early hours of March 27, 2024,…
Agenda Ransomware Targeting VMware and 17k Microsoft Exchange servers vulnerable to cyber attacks
Agenda Ransomware targets VMware servers A recent emergence in the cyber threat landscape has revealed the presence of a new variant of ransomware known as Agenda Ransomware, which has swiftly made its mark by targeting VMware ESXi servers worldwide. This…
Securing Mobile Application Development: 9 Best Practices for Data Security
In today’s interconnected world, mobile applications play a pivotal role in our daily lives, facilitating everything from communication and entertainment to productivity and commerce. However, with the proliferation of mobile apps comes the heightened risk of data breaches and security…
New Zealand accuses China for hacking the Parliament
After the United Kingdom’s purported accusation against China of launching a cyber attack on its Electoral Commission in 2021, allegedly aimed at stealing data pertaining to over 40 million voters, New Zealand (NZ) government has directly pointed fingers at China…
How personalized phish training can thwart evolving cyberattacks
[By: Matt Lindley, COO and CISO at NINJIO] Although the cyberthreat landscape is constantly shifting, several major cybercriminal tactics have stood the test of time. Phishing is one of them. Despite being among the best-known cyberthreats, the damage inflicted by…
Medusa Ransomware group demands $700k from victims
Tarrant Appraisal District (TAD), a governmental entity in Texas, has made headlines due to a sophisticated cyber attack suspected to be orchestrated by the Medusa Ransomware group. The incident came to light on March 24th, 2024, prompting an emergency meeting…
Hackers steal Roku credit card details to make fraudulent purchases
Hackers have reportedly gained unauthorized access to credit card information from approximately 15,000 Roku accounts, according to a disclosure from the media streaming company. With a user base exceeding 80 million active accounts, Roku has become a prime target for…
Understanding the Various Types of DDoS Attacks and Their Implications
In today’s interconnected digital world, Distributed Denial of (DDoS) attacks have emerged as a significant threat to online businesses, organizations, and even individuals. These attacks can disrupt essential services, compromise sensitive data, and incur substantial financial losses. Understanding the different…