Email:

Phone No.

Whatsapp

Blog

Hackers Start Pushing Malware in Worldwide Log4Shell Attacks
Hackers Start Pushing Malware in Worldwide Log4Shell Attacks
Hackers Start Pushing Malware in Worldwide Log4Shell Attacks
Hackers Start Pushing Malware in Worldwide Log4Shell Attacks

Hackers Start Pushing Malware in Worldwide Log4Shell Attacks

Hackers Start Pushing Malware in Worldwide Log4Shell Attacks Threat actors and researchers are scanning for and exploiting the Log4j Log4Shell vulnerability to deploy malware or find vulnerable servers. In this article we have compiled the known payloads, scans, and attacks using the Log4j vulnerability. Early Friday morning, an exploit was publicly released for a critical

PDPA Compliance for the Telecommunication Sector

Organizations that collect, use, and disclose personal data of individuals are required to comply with the provisions of the Personal Data Protection Act. Otherwise, they will be made to pay a hefty fine. This is why the telecommunication sector is encouraged to read the Guidelines and other advisories from the PDPC for them to be

Microsoft: These are the Building Blocks of QBot Malware Attacks

Microsoft: These are the Building Blocks of QBot Malware Attacks As QBot campaigns increase in size and frequency, researchers are looking into ways to break the trojan’s distribution chain and tackle the threat. Over the past few years, Qbot (Qakbot or QuakBot) has grown into widely spread Windows malware that allows threat actors to steal

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us