< p style=”text-align: justify;”> Fortinet, a global leader in cybersecurity with a market valuation of approximately $75 billion, has acquired Israeli company Perception Point to bolster its email and collaboration security capabilities. While the financial terms of the deal…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Blue Yonder Cyberattack: A Wake-Up Call for Supply Chain Security
< p style=”text-align: justify;”>Blue Yonder, a prominent supply chain software provider used by major U.S. grocery chains like Safeway and Fred Meyer, is investigating a significant cyberattack. The ransomware group Termite has claimed responsibility, threatening to publish 680 gigabytes…
Misconfigured AWS Cloud Instances Lead to Sensitive Data Breaches
Misconfigured cloud instances have once again enabled cybercriminals to steal sensitive data, including credentials, API keys, and proprietary source code. This time, numerous Amazon Web Services (AWS) users fell victim, highlighting a lack of understanding regarding the shared responsibility…
The Intersection of Travel and Data Privacy: A Growing Concern
< p style=”text-align: justify;”>The evolving relationship between travel and data privacy is sparking significant debate among travellers and experts. A recent Spanish regulation requiring hotels and Airbnb hosts to collect personal guest data has particularly drawn criticism, with some…
Google’s Quantum Computing Leap: Introducing the “Willow” Chip
Google has made a significant stride in quantum computing with the announcement of its latest chip, named “Willow.” According to Google, this advanced chip can solve problems in just five minutes that would take the most powerful supercomputers on…
Lynx Ransomware Breach Targets Romania’s Electrica Group
The Romanian National Cybersecurity Directorate (DNSC) has confirmed that the Lynx ransomware gang successfully breached Electrica Group, a leading electricity supplier in Romania. About Electrica Group Electrica Group, initially part of the National Electricity Company (CONEL) in 1998, became…
Mandiant Uncovers QR Code Exploit to Bypass Browser Isolation
Mandiant researchers have discovered an innovative method to circumvent browser isolation technology by leveraging QR codes to establish command-and-control (C2) operations. This finding highlights potential vulnerabilities in existing web browser security measures. Understanding Browser Isolation Browser isolation is a…
Beware of Malicious USB-C Cables: Hidden Cyber Threats
In today’s tech-driven world, charging cables are indispensable. However, recent findings about compromised USB-C cables have highlighted significant risks associated with third-party accessories. Security experts warn that hackers can embed tiny computers within ordinary-looking cables, transforming them into tools…
Artivion Discloses Ransomware Attack, Disrupting Operations
< p style=”text-align: justify;”>Leading cardiac surgery medical device company Artivion has reported a ransomware attack that occurred on November 21, resulting in the encryption of certain systems and unauthorized data access. The incident forced the Atlanta-based company to take…
Deep Packet Inspection (DPI): Balancing Security and Privacy in the Digital Age
Deep Packet Inspection (DPI) is an advanced technology for analyzing internet traffic that goes beyond traditional techniques. Unlike standard firewalls that examine only the headers of data packets, DPI scrutinizes both headers and payloads, providing a comprehensive view of…