Ransomware attack disrupts Irish health services

 Ireland’s health care system was hit by a major ransomware attack on Friday, forcing its health service to…

Data leak implicates over 200,000 people in Amazon fake product review scam

Cyber Security researchers have discovered an unsecured database exposing a widespread scam in which Amazon customers…

VPN Hacks Are a Slow-Motion Disaster

This year has seen no scarcity of blockbuster hacks, from the SolarWinds provide chain meltdown to China’s…

Colonial Pipeline Hackers Stole Data on Thursday

The hackers who caused Colonial Pipeline to shut down the biggest U.S. gasoline pipeline on Friday…

An award-winning iPhone hack was used by the Chinese government to spy on Uyghur Muslims, giving Beijing total control of their phones.

An award-winning iPhone hack was used by the Chinese government to spy on Uyghur Muslims, giving Beijing total…

Over the past years, cybersecurity researchers from several companies have demonstrated that a Tesla car can be hacked

Recently, two European researchers have demonstrated how a Tesla can be hacked remotely without any user…

The three new malware strains identified by Mandiant

On Tuesday cybersecurity team said the malware strains, dubbed Doubledrag, Doubledrop, and Doubleback, were detected in December…

What is Zero Trust? And Zero Trust Network Access

What is Zero Trust? There are many definitions, sometimes conflicting, of Zero Trust. Put simply, Zero-Trust…

Smishing meaning and definition

Smishing is a phishing cybersecurity attack carried out over mobile text messaging, also known as SMS…

Cybersecurity Workforce Shortage Continues

For years, we’ve known about the impending shortage of the information security workforce, as evidenced by…