Cybersecurity

Hacker dumps data of 2.8 million Giant Tiger customers

On April 12th, to make it easy for users to check if their information was hacked, breach tracking service HaveIBeenPwned added the leaked...

Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw

î ‚Apr 15, 2024î „NewsroomFirmware Security / Vulnerability A security flaw impacting the Lighttpd web server used in baseboard management controllers (BMCs) has remained unpatched by...

Launching Innovation Rockets, But Beware of the Darkness Ahead

Imagine a world where the software that powers your favorite apps, secures your online transactions, and keeps your digital life could be outsmarted...

Zambia arrests 77 people in swoop on “scam” call centre

Law enforcement officers in Zambia have arrested 77 people at a call centre company they allege had employed local school-leavers to engage in...

CISA opens its malware analysis and threat hunting tool for public use

Tools like CISA’s Malware Next-Gen are invaluable assets in the fight against cybercrime, particularly in a world where data is the new currency,...

Iranian MuddyWater Hackers Adopt New C2 Tool ‘DarkBeatC2’ in Latest Campaign

The Iranian threat actor known as MuddyWater has been attributed to a new command-and-control (C2) infrastructure called DarkBeatC2, becoming the latest such tool...

Recent Articles