Amazon takes NSO Group infrastructure offline

Amazon Web Services (AWS) has closed all accounts linked to the NSO Group. The Israeli company used Amazon's CloudFront to distribute its Pegasus...

Important

Analytics

Ransomware incidents overview, July 5-12, 2021

Much of the public's attention last week was attracted by the cyberattack of ransomware operators REvil against MSP provider Kaseya. According to some experts, the...

Overview of security incidents for the period from 3 to 9 July 2021

Overview of security incidents for the period from 3 to 9 July 2021 The outgoing week turned out to be very eventful in...

Overview of security incidents from June 26 to July 2, 2021

Overview of security incidents from June 26 to July 2, 2021 New attacks by hackers who hacked SolarWinds, data leaks of hundreds of...

‘Cyber ​​attacks successful due to inattention’

'Cyber ​​attacks successful due to inattention' Hackers and cybercriminals are becoming increasingly sophisticated when carrying out cyber attacks. Because citizens take too few...

Overview of security incidents for the period 19-25 June 2021

Overview of security incidents for the period 19-25 June 2021 A team of information security specialists Microsoft Security Intelligence warned users about the ongoing...

These are the most wanted hackers today

Technological advancement and how virtually gigantic the internet is have brought major changes in everyday life. From the way, we communicate to...

Popular

Events

More articles:

Experts

More articles:

News

New

Articles

Amazon takes NSO Group infrastructure offline

Amazon Web Services (AWS) has closed all accounts linked to the NSO Group. The Israeli company used Amazon's CloudFront to distribute its Pegasus...

China denies hacking attacks via Exchange Server

China strongly denies ordering cyber-attacks through vulnerabilities in Microsoft Exchange Server. A spokesman for China's foreign ministry said the allegations were "made up"...

Phishing & Ransomware are Ultimate Threats to Companies in 2021

Phishing & Ransomware attacks have targeted many influential companies for many years, and this year is no different. Cybercriminals are still utilizing the same...

Unique Sophisticated Tools for cybersecurity

Unique Sophisticated Tools for cybersecurity Every day hackers continue to innovate unique ways that enable them to hack into other people's computers, systems, networks, and...

How AI is playing a key role in curbing cyber threats

How AI is playing a key role in curbing cyber threats Technology is advancing and criminals continue to use cyberspace to commit a crime. Due...

Software & Technology Companies become the Key Target for Threat Actors

Almost all industries are vulnerable to cyberattacks, and threat actors continually find new techniques to damage an organization’s reputation using various ways. According to...

Trend

Technologies