Email:

Phone No.

Whatsapp

Category: Cybersecurity (General)

NSA: Top 25 Vulnerabilities Actively Abused By Chinese Hackers
NSA: Top 25 Vulnerabilities Actively Abused By Chinese Hackers
NSA: Top 25 Vulnerabilities Actively Abused By Chinese Hackers
NSA: Top 25 Vulnerabilities Actively Abused By Chinese Hackers

NSA: Top 25 Vulnerabilities Actively Abused By Chinese Hackers

NSA: Top 25 Vulnerabilities Actively Abused By Chinese Hackers The U.S. National Security Agency (NSA) is warning that Chinese state-sponsored hackers exploit 25 different vulnerabilities in attacks against United States organizations and interests. In an advisory issued today, the NSA is aware of targeted attacks by Chinese state-sponsored hackers against National Security Systems (NSS), the U.S.

US Indicts Russian GRU ‘Sandworm’ Hackers For NotPetya, Worldwide Attacks

US Indicts Russian GRU ‘Sandworm’ Hackers For NotPetya, Worldwide Attacks The U.S. Department of Justice has charged six Russian intelligence operatives for hacking operations related to the Pyeongchang Winter Olympics, the 2017 French elections, and the notorious NotPetya ransomware attack. Believed to be part of the elite Russian hacking group known as “Sandworm”, the indictment states

Hackers Hijack Telegram, Email Accounts In SS7 Mobile Attack

Hackers Hijack Telegram, Email Accounts In SS7 Mobile Attack Hackers with access to the Signaling System 7 (SS7) used for connecting mobile networks across the world were able to gain access to Telegram messenger and email data of high-profile individuals in the cryptocurrency business. In what is believed to be a targeted attack, the hackers

Bug Bounty Reporter Cashes Out On Someone Else’s Exploit

Bug Bounty Reporter Cashes Out On Someone Else’s Exploit Bug bounty programs have gained increased momentum and interest from the security research community for their role in promoting security awareness and responsible vulnerability disclosure. But they are not without their fair share of problems.  Bug bounty platforms fill a genuine need. They help companies solicit vulnerability reports in their

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us