Author: wordpress

QR Code Phishing Attacks: A Rising Threat

Leading cybersecurity firms have reported a startling 587% increase in QR code-based phishing assaults in recent times. This concerning pattern demonstrates how fraudsters are changing their strategies to take advantage of people’s confidence in QR codes for a variety of…

India witnesses biggest data breach of Aadhaar details via ICMR

Aadhaar, the unique identification number issued to every Indian citizen, has recently made headlines for all the wrong reasons. There are alarming reports suggesting that the personal information of approximately 815 million citizens was illicitly accessed by hackers through the…

Why ransomware victims can’t stop paying off hackers

In September, MGM Resorts was hit by a devastating ransomware attack, downing operations at some of its most iconic casino hotels in Las Vegas, including the Bellagio, Mandalay Bay and the Cosmopolitan. Guests were forced to wait hours to check…

Attackers Exploiting Critical F5 BIG-IP Vulnerability

Exploitation of a critical vulnerability (CVE-2023-46747) in F5’s  BIG-IP product started less than five days after public disclosure and PoC exploit code was published. The post Attackers Exploiting Critical F5 BIG-IP Vulnerability appeared first on SecurityWeek. This article has been…

Hackers Abuse Google Search Ads to Deploy Bonanza Malware

Cybercriminals are resorting to unscrupulous tactics to deploy Bonanza malware by exploiting Google Search Ads. The hackers are taking advantage of the search engine’s advertising mechanism to spread the malicious software, putting unsuspecting users at risk of cyber attacks. This…

WiHD leak exposes details of all torrent users

World-in-HD (WiHD), a French private video torrent community, left an open instance exposing the emails and passwords of all of its users and administrators. WiHD, a popular torrent tracker specializing in HD movies, inadvertently exposed tens of thousands of its…

Dragos and Rockwell Automation Strengthen Industrial Control System Cybersecurity for Manufacturers with Expanded Capabilities

Today, Dragos Inc., cybersecurity for industrial controls systems (ICS)/operational technology (OT) environments specialists, have announced the expansion of its combined capabilities in partnership with Rockwell Automation, the world’s largest company dedicated to industrial automation and digital transformation. With this expansion,…

Coffee Briefing Oct. 31 – NPower receives investment to empower underserved youth; Dell partners with Meta; Bell outlines five key security outcomes in new report; and more

Coffee Briefings are timely deliveries of the latest ITWC headlines, interviews, and podcasts. Today’s Coffee Briefing is delivered by IT World Canada’s editorial team! Missed last week’s Coffee Briefing? We’ve got you covered. NPower receives investment from DIGITAL, CIBC and Microsoft…

Understanding Zero Trust Security Building a Safer Digital World

In our rapidly evolving digital age where technology underpins almost every facet of our lives, cybersecurity has never been more critical. As the world becomes increasingly interconnected with personal devices and social networks to critical infrastructure and global business operations,…