KEEP IN TOUCH
Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!
Hackers Start Pushing Malware in Worldwide Log4Shell Attacks Threat actors and researchers are scanning for and exploiting the Log4j Log4Shell vulnerability to deploy malware or find vulnerable servers. In this article we have compiled the known payloads, scans, and attacks using the Log4j vulnerability. Early Friday morning, an exploit was publicly released for a critical
Organizations that collect, use, and disclose personal data of individuals are required to comply with the provisions of the Personal Data Protection Act. Otherwise, they will be made to pay a hefty fine. This is why the telecommunication sector is encouraged to read the Guidelines and other advisories from the PDPC for them to be