Email:

Phone No.

Whatsapp

Blog

These are the Cryptomixers Hackers Use to Clean their Ransoms
These are the Cryptomixers Hackers Use to Clean their Ransoms
These are the Cryptomixers Hackers Use to Clean their Ransoms
These are the Cryptomixers Hackers Use to Clean their Ransoms

These are the Cryptomixers Hackers Use to Clean their Ransoms

These are the Cryptomixers Hackers Use to Clean their Ransoms Cryptomixers have always been at the epicenter of cybercrime activity, allowing hackers to “clean” cryptocurrency stolen from victims and making it hard for law enforcement to track them. When threat actors steal cryptocurrency or receive it as a ransom payment, law enforcement or researchers can

Microsoft Adds AI-driven Ransomware Protection to Defender

Microsoft Adds AI-driven Ransomware Protection to Defender Microsoft has introduced an AI-driven ransomware attack detection system for Microsoft Defender for Endpoint customers that complements existing cloud protection by evaluating risks and blocking actors at the perimeter. As human-operated ransomware attacks are characterized by a specific set of methods and behaviors, Microsoft believes that they can

NPM Fixes Private Package Names Leak, Serious Authorization Bug

NPM Fixes Private Package Names Leak, Serious Authorization Bug The largest software registry of Node.js packages, npm, has disclosed multiple security flaws that were identified and remedied recently. The first flaw concerns leak of names of private npm packages on the npmjs.com’s ‘replica’ server—feeds from which are consumed by third-party services. Whereas, the second flaw allows attackers to publish

November 2021 PDPC Incidents and Undertaking: Lessons from the Cases

November 2021 PDPC Incidents and Undertaking The November 2021 PDPC Incidents and Undertaking decisions of the Personal Data Protection Commission (PDPC) have been published on PDPC’s official website. Three (3) cases were highlighted this month, with decisions ranging from no breach at all, to whopping financial penalties for failure to put in place reasonable security

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us