Email:

Phone No.

Whatsapp

Blog

Microsoft Identifies 40+ Victims Of SolarWinds Hack, 80% from US
Microsoft Identifies 40+ Victims Of SolarWinds Hack, 80% from US
Microsoft Identifies 40+ Victims Of SolarWinds Hack, 80% from US
Microsoft Identifies 40+ Victims Of SolarWinds Hack, 80% from US

Microsoft Identifies 40+ Victims Of SolarWinds Hack, 80% from US

Microsoft Identifies 40+ Victims Of SolarWinds Hack, 80% from US Microsoft said that over 40 of its customers had their networks infiltrated by hackers following the SolarWinds supply chain attack after they installed backdoored versions of the Orion IT monitoring platform. Last weekend, FireEye discovered that a group of nation-state hackers (tracked as UNC2452 or Dark Halo) breached

Microsoft Confirms Breach In SolarWinds Hack, Denies Infecting Others

Microsoft Confirms Breach In SolarWinds Hack, Denies Infecting Others Microsoft has confirmed that they were hacked in the recent SolarWinds attacks but denied that their software was compromised in a supply-chain attack to infect customers. This past weekend it was discovered that Russian state-sponsored hackers breached SolarWinds and used their auto-update mechanism to distribute a backdoor to clients. This

SolarWinds Hackers Breach US Nuclear Weapons Agency

SolarWinds Hackers Breach US Nuclear Weapons Agency Update: US DOE has confirmed that the hacking group behind the SolarWinds compromise also hacked the networks of the US nuclear weapons agency: Department of Energy is responding to a cyber incident related to the SolarWinds compromise in coordination with our federal and industry partners. The investigation is ongoing

Bouncy Castle Crypto Authentication Bypass Vulnerability Revealed

Bouncy Castle Crypto Authentication Bypass Vulnerability Revealed A severe authentication bypass vulnerability has been reported in Bouncy Castle, a popular open-source cryptography library. When exploited, the vulnerability (CVE-2020-28052) can allow an attacker to gain access to user or administrator accounts due to a cryptographic weakness in the way passwords are checked. Bouncy Castle is a set of cryptography

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us