English News

Hackers steal information about millions of car owners from garage databases

Hackers steal information about millions of car owners from garage databases

The names, addresses and phone numbers of ‘millions’ of people have been stolen from a company which provides IT services to garages, broadcaster NOS reported […]
UK cyber security law forcing energy companies to report hacks has led to no reports, despite numerous hacks

UK cyber security law forcing energy companies to report hacks has led to no reports, despite numerous hacks

But since then not a single report has been made, Sky News can reveal, despite numerous successful hacks of British energy firms attributed to hostile […]
Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Security Directory Server

Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Security Directory Server

There are vulnerabilities in IBM SDK Java Technology Edition that is shipped with IBM Security Directory Server(SDS) The issues were disclosed as part of the […]
Data of 6.5 million Israeli citizens leaks online

Data of 6.5 million Israeli citizens leaks online

The voter registration and personal details of millions of Israeli citizens were leaked online on Monday, just two days before the country held general elections […]
Energy Giant Shell Is Latest Victim of Accellion Attacks

Energy Giant Shell Is Latest Victim of Accellion Attacks

Attackers accessed personal and business data from the company’s legacy file-transfer service in a recent data-security incident but core IT systems remained untouched. Mit dem […]
Gartner Forecasts Worldwide Social Software and Collaboration Market to Grow 17% in 2021

Gartner Forecasts Worldwide Social Software and Collaboration Market to Grow 17% in 2021

Remote Work and Enterprise Application Partnerships to Drive Double-Digit Growth Through 2022 The worldwide social software and collaboration market is forecast to total $4.5 billion […]
Gartner Identifies Top Security and Risk Management Trends for 2021

Gartner Identifies Top Security and Risk Management Trends for 2021

Analysts Explore Industry Trends at Gartner Security & Risk Management Summit APAC, 23-24 March 2021 Security and risk management leaders must address eight top trends […]
White Paper: The Critical Controls Implementation for SAP

White Paper: The Critical Controls Implementation for SAP

Onapsis, in collaboration with The Cloud Security Alliance (CSA), a not-for-profit organization dedicated to raising awareness of best practices to help ensure a secure cloud computing environment, has […]
Dangers in SAP Transport Management Part 3

Dangers in SAP Transport Management Part 3

Manipulation of the SAP Job Management This is part three of our blog series on the Dangers in SAP Transport Management. In part one, we […]
Top 15 Essential Malware Analysis Tools

Top 15 Essential Malware Analysis Tools

Malware analysis plays an essential role in avoiding and understanding cyber attacks. When incident response teams are brought into an an incident involving malware, the […]
Office 365 Phishing Attack Targets Financial Execs

Office 365 Phishing Attack Targets Financial Execs

Attackers move on new CEOs, using transition confusion to harvest Microsoft credentials. A new phishing scam is on the rise, targeting executives in the insurance […]
Ransomware gang demands $50 million from computer maker Acer

Ransomware gang demands $50 million from computer maker Acer

Taiwanese computer maker Acer has suffered a ransomware attack over the past weekend at the hands of the REvil ransomware gang, which is now demanding […]
Threat actors start attacking F5 devices using recent vulnerability

Threat actors start attacking F5 devices using recent vulnerability

Multiple hacking groups have started attacking F5 networking devices after the publication of proof-of-concept exploit code online for a recent critical vulnerability the vendor patched […]
Why America will never be safe from cyberattacks

Why America will never be safe from cyberattacks

It’s impossible to stop all hacks, and a lack of cybersecurity experts isn’t helping + “Nobody knows how to make a system that is usable […]
China-linked TA428 Continues to Target Russia and Mongolia IT Companies

China-linked TA428 Continues to Target Russia and Mongolia IT Companies

Recorded Future’s Insikt Group recently identified renewed activity attributed to the suspected Chinese threat activity group TA428. The identified activity overlaps with a TA428 campaign […]
“Expert” hackers used 11 zerodays to infect Windows, iOS, and Android users

“Expert” hackers used 11 zerodays to infect Windows, iOS, and Android users

The breadth and abundance of exploits for unknown vulnerabilities sets group apart. https://arstechnica.com/information-technology/2021/03/expert-hackers-used-11-zerodays-to-infect-windows-ios-and-android-users/     […]