A cyber attack that disrupted international satellite internet and TV provider Viasat is being investigated by a tandem of global intelligence services, with Russia as the lead suspect.
News has recently emerged that the US Census Bureau was compromised by a cyber attack in January 2020 which was traced back to a Citrix vulnerability that had just been publicly disclosed about a month prior.
North Korean hackers are running cyber attacks that focus on fraudulent cash-outs at ATM machines by hacking payment systems, augmenting with use of social engineering elements.
Suspected state-sponsored hackers compromised at least 100 employees of at least 21 natural gas producers before staging a cyber attack on the eve of the Russian invasion.
High-profile cyber attack that struck British budget airline EasyJet may have been carried out by Chinese hackers who have stolen email addresses and travel details of millions of passengers.
Officials have warned that the NHS patient data stolen in the University of Manchester cyber attack could become publicly available with potential ramifications. The incident impacted UoM, which holds patient information of 1.1 million patients across 200 hospitals.
Crypto exchange Liquid, one Japan's most popular exchanges, is now short $97 million in total assets after a cyber attack that pulled funds directly from the wallets of some of its customers.
European oil terminals are reporting recent cyber attacks that have disrupted operations, collectively impacting port operations throughout Europe and Africa. Timing of cyber attacks in Europe raises questions about coordinated campaign.
Supply chain security is in the news once again as a cyber attack on Zellis, a UK-based payroll provider, has led to the compromise of numerous organizations. Among the biggest names impacted by the attack are the BBC, British Airways and major UK drugstore chain Boots.
As applications grow more complex, attackers will increasingly seek to exploit vulnerabilities in business logic to bypass traditional security measures and gain unauthorized access. To address this threat, organizations must rethink their current security strategies for protecting applications and APIs, and the data they’re accessing.