Email:

Phone No.

Whatsapp

Blog

HPE Says Hackers Breached Aruba Central Using Stolen Access Key
HPE Says Hackers Breached Aruba Central Using Stolen Access Key
HPE Says Hackers Breached Aruba Central Using Stolen Access Key
HPE Says Hackers Breached Aruba Central Using Stolen Access Key

HPE Says Hackers Breached Aruba Central Using Stolen Access Key

HPE Says Hackers Breached Aruba Central Using Stolen Access Key HPE has disclosed that data repositories for their Aruba Central network monitoring platform were compromised, allowing a threat actor to access collected data about monitored devices and their locations. Aruba Central is a cloud networking solution that allows administrators to manage large networks and components

FBI Warns of Iranian Hackers Looking to Buy US Orgs’ Stolen Data

FBI Warns of Iranian Hackers Looking to Buy US Orgs’ Stolen Data The Federal Bureau of Investigation (FBI) warned private industry partners of attempts by an Iranian threat actor to buy stolen information regarding US and worldwide organizations. The warning came in a private industry notification (PIN) marked as TLP:AMBER, seen by BleepingComputer earlier this week.

Telnyx is the Latest VoIP Provider Hit with DDoS Attacks

Telnyx is the Latest VoIP Provider Hit with DDoS Attacks Telnyx is the latest VoIP telephony provider targeted with distributed denial-of-service (DDoS) attacks, causing worldwide outages since yesterday. Telnyx is a voice over Internet Protocol (VoIP) company that provides worldwide telephony services over the Internet, including in the Americas, EMEA, APAC, and Australia regions. Starting November

Researchers Show that Apple’s CSAM Scanning Can be Fooled Easily

Researchers Show that Apple’s CSAM Scanning Can be Fooled Easily A team of researchers at the Imperial College in London have presented a simple method to evade detection by image content scanning mechanisms, such as Apple’s CSAM. CSAM (Child Sexual Abuse Material) was a controversial proposal submitted by Apple earlier this year. The proposal was

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us