March 2022, Issue II 1. Samsung suffers massive leak of source code by LAPSU$ […]
Read moreMarch 2022, Issue II 1. Samsung suffers massive leak of source code by LAPSU$ […]
Read moreMarch 2022, Issue I 1. NVIDIA credentials and proprietary information stolen by LAPSU$ hacker […]
Read moreThe term open-source software refers to software users can modify and leverage thanks to its […]
Read moreCryptojacking: The Silent Intruder Cryptojacking, as the name suggests, is when criminals gain unauthorized access […]
Read moreFebruary 2022, Issue II 1. Airport services giant Swissport struck by AlphV/BlackCat ransomware Zurich-based […]
Read moreFebruary 2022, Issue I 1. Cyberattack at Red Cross compromises personal record of 515,000 […]
Read moreIncreasingly Powerful DDoS Attacks Distributed denial-of-service (DDoS) has long been a popular cyberattack method used […]
Read moreWe saw a downward trend in the overall number of web vulnerabilities during the last […]
Read moreAs it becomes more crucial for companies to adopt advanced technologies to thrive in this […]
Read moreJanuary 2022, Issue II 1. Ukrainian government agencies suffer massive website defacement attack Over […]
Read more