Email:

Phone No.

Whatsapp

Blog

DoubleVPN Servers, Logs, and Account Info Seized By Law Enforcement
DoubleVPN Servers, Logs, and Account Info Seized By Law Enforcement
DoubleVPN Servers, Logs, and Account Info Seized By Law Enforcement
DoubleVPN Servers, Logs, and Account Info Seized By Law Enforcement

DoubleVPN Servers, Logs, and Account Info Seized By Law Enforcement

DoubleVPN Servers, Logs, and Account Info Seized By Law Enforcement aw enforcement has seized the servers and customer logs for DoubleVPN, a double-encryption service commonly used by threat actors to evade detection while performing malicious activities. DoubleVPN is a Russian-based VPN service that double-encrypts data sent through their service. When using the service, requests are

Microsoft’s Halo Dev Site Breached Using Dependency Hijacking

Microsoft’s Halo Dev Site Breached Using Dependency Hijacking Microsoft has once again been successfully hit by a dependency hijacking attack. Previously, as first reported by BleepingComputer, a researcher had ethically hacked over 35 major tech firms, including Microsoft, by exploiting a weakness called “dependency confusion.” This month, another researcher found an npm internal dependency being used

Windows 11 May Support Intel 7th Gen, AMD Zen 1 CPUs in the Future

Windows 11 May Support Intel 7th Gen, AMD Zen 1 CPUs in the Future Microsoft announced today that they might lower the Windows 11 system requirements to allow Intel 7th generation and AMD Zen 1 CPUs to use the new operating system. When Microsoft announced Windows 11, they also released new system requirements that significantly reduced the variety

REvil Ransomware’s New Linux Encryptor Targets ESXi Virtual Machines

REvil Ransomware’s New Linux Encryptor Targets ESXi Virtual Machines The REvil ransomware operation is now using a Linux encryptor that targets and encrypts Vmware ESXi virtual machines. With the enterprise moving to virtual machines for easier backups, device management, and efficient use of resources, ransomware gangs increasingly create their own tools to mass encrypt storage

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us