A massive supply chain attack had distributed malware to tens of thousands of ASUS computers worldwide through legitimate ASUS software updates. It appears as if the attackers had inside information about ASUS servers and systems. Read More
Iranian hackers are extending their attacks to political, diplomatic and military targets in U.S, Australia, and U.K. It now appears to be part of a long-term, state-sponsored cyber hacking campaign by Iran. Read More
Put to the test, more than 50 U.K. universities were found to be very vulnerable to cyber attacks. Jisc's team of penetration testers were able to breach defenses in one to two hours with a 100% breach rate. Read More
Recent SWIFT report shows an evolution of cyber threats to international payment flows with cyber criminals becoming increasingly sophisticated in evading detection when carrying out fraudulent payment transactions. Read More
Vulnerable IT service providers are becoming entry points for supply chain attacks as seen in the recent attack on Wipro. The attack follows closely after Wipro CEO declares "security cannot be a show stopper for business priorities". Read More
Majority of fraud transactions are coming from mobile apps and mobile browsers. How do the hackers attack mobile apps and how could you protect yourself against it? Read More
Are ransomware attacks making a comeback as a dominant cyber security threat? Norsk Hydro, Verint, Weather Channel and Arizona Beverages are among the big names who have fallen victim in recent weeks. Read More
The IT security industry is facing a new wave of hacking through smart technology, machine learning, and artificial intelligence where hackers will unleash unethical tactics to target and manipulate individuals and organizations. Read More
Mysterious organization exposed tools and source code used by Iranian hackers, including personal information of some Iranian Ministry of Intelligence members responsible for state-sponsored cyber attacks. Read More
Chinese spies known as Buckeye group are alleged to be using some of the NSA cyber weapons as early as March 2016, long before Shadow Brokers released them in April 2017. Read More