Your search for ‘cyber attack
’has 425 results
SEARCH RESULTS
Society
Hackers stole Pfizer-BioNTech COVID-19 vaccine trial data from EMA servers in December and leaked them on online forums, claiming they were defrauding people.
Technology
Manteiga With his deep experience in the business of Information Security Analysis, outlines a few techniques that small companies may use to prevent cyber attacks
Tech & Trend
A report cites evidences that suggest that Russia exploited several layers of the supply chain to intrude the systems of the agencies.
CyberSecurity
Hackers posted fake Facebook ads from legitimate companies to lure victims into providing Facebook logins in 10 countries
CyberSecurity
The hackers breached into Microsoft's internal network and used an internal account to view source code but as it had view-only access, they could not alter the codes.
CyberSecurity
Suspected Chinese hackers infected two Vietnamese government digital certificate client apps with PhantomNet malware to create a backdoor
CyberSecurity
GoDaddy faced backlashes after it sent a phishing email to employees offering holiday bonuses but it turned out to be a security test.
CyberSecurity
Canada-based Citizen Lab found that 36 journalists' iPhones were hacked exploiting a "zero-click" vulnerability in Apple's iMessage.
Society
The hackers reportedly used a malicious update to SolarWinds' Orion network monitoring platform to gain access into the Treasury's systems.
CyberSecurity
Hundreds of thousands of Ledger customers have been targeted with phishing attacks since the data was posted on a hacker's forum
Society
As Donald Trump remained mum on the alleged Russian-backed cyberattacks that compromised national security, Republican and Democrat senators have called retaliation.
CyberSecurity
Among half a dozen U.S. federal agencies, the networks of the Department of Energy and National Nuclear Security Administration were also compromised.
Crime
The malware can steal personal information including SMS, GPS location, photos and contacts that can be used for extortion and future phishing attacks.
CyberSecurity
By planting malware on an air-gapped computer, hackers can convert electromagnetic signals of RAM modules to transfer data wirelessly.
CyberSecurity
The infamous APT32, also known as OceanLotus, is allegedly backed by the Vietnam government and has been tracked to a local IT firm.
CyberSecurity
Named Adrozek, the malware hijacks browsers' ads and replace with affiliate links besides stealing user credentials that can be used to get into online banking
Society
The cyber-attack comes just a day before the EMA is due to update the European Parliament on the progress of the vaccine assessments.
CyberSecurity
The hackers used sophisticated methods to conceal their identity and stole FireEye's cyber defense toolkits that could be used in future breaches.
Technology
Cybersecurity research firm Forescout found 33 vulnerabilities in smart home devices from 150 vendors that could affect millions of users.
Technology
By modifying LiDAR sensors on robot vacuum cleaners, hackers can use it for LidarPhone attack and listen to private conservation for extracting sensitive information