Email:

Phone No.

Whatsapp

Category: Cybersecurity (General)

Log4j Vulnerability Now Used by state-backed Hackers, Access Brokers
Log4j Vulnerability Now Used by state-backed Hackers, Access Brokers
Log4j Vulnerability Now Used by state-backed Hackers, Access Brokers
Log4j Vulnerability Now Used by state-backed Hackers, Access Brokers

Log4j Vulnerability Now Used by state-backed Hackers, Access Brokers

Log4j Vulnerability Now Used by state-backed Hackers, Access Brokers As expected, nation-state hackers of all kinds have jumped at the opportunity to exploit the recently disclosed critical vulnerability (CVE-2021-44228) in the Apache Log4j Java-based logging library. Also known as Log4Shell or LogJam, the vulnerability is now being used by threat actors linked to governments in

Telecom Operators Targeted in Recent Espionage Hacking Campaign

Telecom Operators Targeted in Recent Espionage Hacking Campaign Researchers have spotted a new espionage hacking campaign targeting telecommunication and IT service providers in the Middle East and Asia. The campaign has been conducted over the past six months, and there are tentative links to the Iranian-backed actor, MERCURY (aka MuddyWater, SeedWorm, or TEMP.Zagros). The report comes from the Threat

New Ransomware Now Being Deployed in Log4Shell Attacks

New Ransomware Now Being Deployed in Log4Shell Attacks The first public case of the Log4j Log4Shell vulnerability used to download and install ransomware has been discovered by researchers. Last Friday, a public exploit was released for a critical zero-day vulnerability named ‘Log4Shell’ in the Apache Log4j Java-based logging platform. Log4j is a development framework that allows developers

Digging deep: The Cybersecurity Act of Singapore

The Cybersecurity Act is an Act that requires or authorizes the taking of measures to prevent, manage and respond to cybersecurity threats and incidents, to regulate owners of critical information infrastructure and cybersecurity service providers, and to make consequential or related amendments to certain other written laws. The Cybersecurity Bill was enacted on February 5,

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us