Have you ever been on a ship’s bridge and noticed that the ship is changing direction without explanation? This could be the result of a cyber attack on the ship’s systems. The maritime industry is increasingly concerned about cybersecurity threats, and a new course called “Maritime digital security” has been developed at The Norwegian University […]
According to a study commissioned by the Computer and Communications Industry Association (CCIA), a proposed European Union cloud security label that could exclude non-EU cloud services providers such as Amazon, Google, and Microsoft is discriminatory and could lead to retaliatory measures. The study was conducted by the European Centre for International Political Economy (ECIPE) and […]
GitHub.com has taken the precautionary measure of rotating its private RSA SSH key after it was accidentally exposed in a public repository. Although the key was only briefly exposed, GitHub has replaced it to ensure the security of its users. GitHub’s Chief Security Officer and SVP of Engineering, Mike Hanley, stated that the exposure was […]
A new article reports that an advanced threat actor has been discovered using a previously unseen malicious framework called CommonMagic and a new backdoor called PowerMagic. The malware pieces have been used in operations since at least September 2021 and continue to target organizations in the administrative, agriculture, and transportation sectors for espionage purposes. Once […]
Dole, a global provider of fresh fruits and vegetables to over 75 countries, has disclosed that an undisclosed number of its employees were impacted in a cyberattack last month. The company, which employs around 38,000 people worldwide, made the revelation in an annual report filed with the US Securities and Exchange Commission on Wednesday. In […]
On March 16, Latitude Financial, an ASX-listed entity, announced a trading halt following a “sophisticated and malicious cyberattack” that resulted in the theft of some customer data. The company said that the attacker used employee login credentials to obtain personal information that was held by two service providers. Hackers obtained 225,000 customer records from one […]
A recent report from Huntress reveals that the majority of businesses in the United States and Canada are mid-sized, and many are struggling to address their cybersecurity challenges. The report surveyed mid-sized businesses on their organizational structure, resources, and cybersecurity strategies. The findings suggest that there are significant gaps in key functions, including planning, staffing, […]
During the pandemic, businesses worldwide adopted cloud computing, leading to an increase in data breaches and cyberattacks. Business leaders must implement better strategies to secure their cloud infrastructure. However, many myths and misconceptions surround cloud security. In this article, five myths about cloud computing security are debunked. The first myth is that the cloud is […]
Microsoft and cloud gaming provider Boosteroid have entered into a 10-year agreement to bring Xbox PC games to Boosteroid’s cloud gaming platform. The partnership will enable Boosteroid customers to stream Activision Blizzard PC titles after Microsoft’s acquisition of the company closes. As a result of the partnership and other recent collaborations, popular franchises such as […]
Following the arrest of Breached’s founder and owner, Pompompurin, the remaining administrator, Baphomet, took the site offline and planned to migrate it to a new, untraceable infrastructure. However, Baphomet disclosed in a series of updates that law enforcement likely had access to Pompompurin’s machine, leaving the site’s data and users vulnerable. In response to this […]