An activist hacking group has alleged that it leaked a substantial amount of Disney’s internal communications, including details about unreleased projects, raw images, computer code, and some login credentials. The group, known as Nullbulge, has claimed responsibility for the…
Category: CySecurity News – Latest Information Security and Hacking Incidents
The Role of IoT in Modern Infrastructure
Imagine if someone told you in the early 2000s that entire industries would run almost by themselves, thanks to a network of connected devices. Today, this is no longer science fiction but our reality, thanks to the Internet of Things…
How to Protect Your Online Accounts from Hackers
Hackers are increasingly targeting individuals to steal cryptocurrency, access bank accounts, or engage in stalking. Although these attacks are relatively rare, it’s crucial to know how to protect yourself if you suspect someone has accessed your email or social…
NATO Collaborates with Start-Ups to Address Growing Security Threats
Marking its 75th anniversary at a summit in Washington DC this week, the North Atlantic Treaty Organization (NATO) focused on Ukraine while emphasizing the importance of new technologies and start-ups to adapt to modern security threats. In its Washington…
Here’s How Nvidia’s Chips Can Disrupt Large-Scale Indian Weddings
The big large Indian wedding is all about making memories that will last a lifetime. Weddings of a significant size can budget anywhere between Rs 15 lakh and Rs 50 lakh specifically for photographs and videos that capture every…
Breaking Down the Clock PoC Exploits Utilized by Hackers Within 22 Minutes
It has been shown that threat actors are swift in weaponizing available proof-of-concept (PoC) exploits in real attacks, often within 22 minutes of publicly releasing these exploits. In that regard, Cloudflare has published its annual Application Security report for…
Hacker Subscription Service Exposes 600,000 Bank Card Details
A disturbing new hacker subscription service has emerged, offering access to 600,000 stolen bank card details for a fee of just £120. This service, identified by cybersecurity researchers from Flare, is named “Breaking Security” and allows its subscribers to…
3 Billion Attacks and Counting: The IDF’s Cyber Resilience
The Battlefield: Cloud Computing Cloud computing has become an integral part of modern military operations. The IDF relies heavily on cloud-based systems from troop management to logistics, communication, and intelligence gathering. These systems allow for flexibility, scalability, and efficient resource…
Are We Ready for the Next Wave of Cyber Threats?
In our increasingly digital world, cybersecurity is a growing concern for everyone— from businesses and governments to everyday individuals. As technology advances, it opens up exciting possibilities and creates new, sophisticated cyber threats. Recent high-profile attacks, like those on Ascension…
AT&T Paid Attackers $370K to Delete Stolen Customer Data
AT&T reportedly paid a hacker more than $370,000 to remove stolen customer data. In an extraordinary turn of events, the ransom may not have gone to those responsible for the breach. Last Friday, AT&T disclosed that an April data…