Cybersecurity

JIT Probe Reveals 2.7M Pakistani Citizens’ Data Breached for 5 Years, NADRA Blamed for Data Leak

According to a probe by a joint investigation team, the personal records of over 2.7 million Pakistani citizens have been exposed online in massive data breaches over the past 5 years. The probe discovered that highly sensitive information belonging to citizens, such...

Omni Hotels Nationwide IT Outage Due to a Possible Cyberattack

Omni Hotels & Resorts has recently faced a system-wide IT outage that resulted in the disruption of its IT systems on Friday. This outage has affected various aspects of their operations, including reservation systems, hotel room door locks, and point-of-sale...

DinodasRAT Malware Targets Red Hat and Ubuntu Linux Servers for Cyber Espionage

Security researchers have recently detected attacks targeting Red Hat and Ubuntu systems by a Linux version of the DinodasRAT malware, also known as XDealer. These attacks may have been ongoing since 2022, although the initial version of the malware was identified in...

Google’s New AI Search, Or a Gateway to Malware and Scams?

Search engines play a crucial role in guiding users to relevant and trustworthy information. Google, being the most popular search engine, constantly tries to improve its search results using cutting-edge technologies. However, recent reports have raised concerns...

CISA Issues Advisory to Devs to Address SQL Injection Vulnerabilities

CISA and the FBI have advised technology manufacturing company executives to conduct thorough reviews of their software and take necessary measures to address SQL injection vulnerabilities before shipping. SQL injection attacks...

POC Exploit Released for Fortinet RCE Bug, Patch Now!

A critical vulnerability in Fortinet's FortiClient Enterprise Management Server (EMS) software has been discovered and is currently being actively exploited in attacks. Security researchers have released a proof-of-concept (PoC) exploit for this vulnerability....

This Week in Cybersecurity: 18th March to 22nd March, CISA Hacked!

CISA Hacked, IMF Breached, AT&T Data Leaked, United Healthcare Pays $2B CISA Hacked, Key Systems Forced Offline Unknown hackers have breached the systems of the Cybersecurity and Infrastructure Security Agency (CISA), forcing the agency to take its key systems...

ZTA 101: A Comprehensive Guide to Understanding ‘Zero Trust Architecture’

Zero Trust Architecture (ZTA), often encapsulated in the phrase “Never Trust, Always Verify,” represents a paradigm shift in how organizations approach data and network security. Understanding ZTA is crucial for organizations as it offers a robust framework to protect...

Enhanced OSINT with DarkGPT, An AI Tool to Detect Leaked Databases

A Spanish security researcher “luijait “, recently unveiled an AI-powered tool called DarkGPT that aims to streamline the process of open-source intelligence (OSINT) gathering. DarkGPT leverages the power of natural language processing to assist with queries about...

Timeline of Change Healthcare Cyberattack

On February 21, a highly significant and impactful cyberattack commenced against UnitedHealth Group's Change Healthcare, causing severe disruption to the financial operations of hospitals, insurers, pharmacies, and medical groups across the entire nation. Here is a...
Omni Hotels Nationwide IT Outage Due to a Possible Cyberattack

Omni Hotels Nationwide IT Outage Due to a Possible Cyberattack

Omni Hotels & Resorts has recently faced a system-wide IT outage that resulted in the disruption of its IT systems on Friday. This outage has affected various aspects of their operations, including reservation systems, hotel room door locks, and point-of-sale...

Google’s New AI Search, Or a Gateway to Malware and Scams?

Google’s New AI Search, Or a Gateway to Malware and Scams?

Search engines play a crucial role in guiding users to relevant and trustworthy information. Google, being the most popular search engine, constantly tries to improve its search results using cutting-edge technologies. However, recent reports have raised concerns...

POC Exploit Released for Fortinet RCE Bug, Patch Now!

POC Exploit Released for Fortinet RCE Bug, Patch Now!

A critical vulnerability in Fortinet's FortiClient Enterprise Management Server (EMS) software has been discovered and is currently being actively exploited in attacks. Security researchers have released a proof-of-concept (PoC) exploit for this vulnerability....

This Week in Cybersecurity: 18th March to 22nd March, CISA Hacked!

This Week in Cybersecurity: 18th March to 22nd March, CISA Hacked!

CISA Hacked, IMF Breached, AT&T Data Leaked, United Healthcare Pays $2B CISA Hacked, Key Systems Forced Offline Unknown hackers have breached the systems of the Cybersecurity and Infrastructure Security Agency (CISA), forcing the agency to take its key systems...

Enhanced OSINT with DarkGPT, An AI Tool to Detect Leaked Databases

Enhanced OSINT with DarkGPT, An AI Tool to Detect Leaked Databases

A Spanish security researcher “luijait “, recently unveiled an AI-powered tool called DarkGPT that aims to streamline the process of open-source intelligence (OSINT) gathering. DarkGPT leverages the power of natural language processing to assist with queries about...

Timeline of Change Healthcare Cyberattack

Timeline of Change Healthcare Cyberattack

On February 21, a highly significant and impactful cyberattack commenced against UnitedHealth Group's Change Healthcare, causing severe disruption to the financial operations of hospitals, insurers, pharmacies, and medical groups across the entire nation. Here is a...

Cybersecurity Compliance: A Definitive Guide

Cybersecurity Compliance: A Definitive Guide

In an era defined by digital transformation and data-driven operations, cybersecurity has become paramount. Organizations across the globe face an ever-expanding landscape of cyber threats that have the potential to disrupt operations, compromise sensitive data, and...

Stay Up to Date With The Latest News & Updates

Join Our Newsletter

 

Subscribe To Our Newsletter

Sign up to our weekly newsletter summarizing everything thats happened in data security, storage, and backup and disaster recovery

You have Successfully Subscribed!