Email:

Phone No.

Whatsapp

Day: January 6, 2021

Hackers Start Exploiting The New Backdoor In Zyxel Devices
Hackers Start Exploiting The New Backdoor In Zyxel Devices
Hackers Start Exploiting The New Backdoor In Zyxel Devices
Hackers Start Exploiting The New Backdoor In Zyxel Devices

Hackers Start Exploiting The New Backdoor In Zyxel Devices

Hackers Start Exploiting The New Backdoor In Zyxel Devices Threat actors are actively scanning the Internet for open SSH devices and trying to login to them using a new recently patched Zyxel hardcoded credential backdoor. Last month, Niels Teusink of Dutch cybersecurity firm EYE disclosed a secret hardcoded backdoor account in Zyxel firewalls and AP controllers. This

Vodafone’s Ho. Mobile Admits Data Breach, 2.5m Users Impacted

Vodafone’s Ho. Mobile Admits Data Breach, 2.5m Users Impacted Vodafone Group’s low-cost operator ho. Mobile announced that hackers stole part of its customer database thus obtaining personal user information and SIM technical data. The stolen database, offered for sale on dark web forums since December 22, has been partially verified and includes sufficient details to

US Govt Says Russian State Hackers Likely Behind SolarWinds Hack

US Govt Says Russian State Hackers Likely Behind SolarWinds Hack The Cyber Unified Coordination Group (UCG) said today that a Russian-backed Advanced Persistent Threat (APT) group is likely behind the SolarWinds hack. The UCG was established by the National Security Council (NSC) after the SolarWinds supply chain attack to help the intelligence agencies better coordinate the government’s response efforts surrounding this

NSA Shares Guidance, Tools To Mitigate Weak Encryption Protocols

NSA Shares Guidance, Tools To Mitigate Weak Encryption Protocols The National Security Agency (NSA) has shared guidance on how to detect and replace outdated Transport Layer Security (TLS) protocol versions with up to date and secure variants. The US intelligence agency also highlights the dangers behind using deprecated TLS including both risks of sensitive data exposure and

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us