Category: EN

Western Sydney University Hit by Major Cyberattack

  Western Sydney University has suffered a significant cyberattack, marking the latest in a series of incidents targeting the institution since 2023. Sensitive data belonging to students, staff, and alumni—including tax file numbers, bank account details, passport and driver license…

Quantum light breakthrough could transform technology

Scientists have achieved a breakthrough in light manipulation by using topological insulators to generate both even and odd terahertz frequencies through high-order harmonic generation (HHG). By embedding these exotic materials into nanostructured resonators, the team was able to amplify light…

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 69

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter Agenda Ransomware Deploys Linux Variant on Windows Systems Through Remote Management Tools and BYOVD Techniques Uncovering Qilin attack methods…

Ukrainian extradited to US over Conti ransomware involvement

Ukrainian Oleksii Lytvynenko extradited from Ireland to US for alleged role in Conti ransomware after fleeing Ukraine in 2022. Ukrainian national Oleksii Lytvynenko (43) extradited from Ireland to the US, faces charges for alleged involvement in Conti ransomware attacks after…

What Rural Internet Providers Offer Remote Communities

Loss of internet access in rural areas is considerably more serious, as it disrupts education, work, and communication. Despite such hurdles, it is rural internet providers serving such remote communities and getting them connected. By understanding what these providers can…

A Walk in the Park

In August of 2024 I stopped in my local book shop (shoutout to The Raven Bookstore) as I often do to browse the shelves and see if there was anything I couldn’t live without. A very colorful book jacket caught…

Iran Attacks Israeli Cybersecurity Infrastructure

The National Cyber Directorate found a series of cyberattacks that targeted Israeli organisations that offer IT services to companies in the country, and might be linked to Iran. Earlier this month, the failed cyberattack against Shamir Medical Center on Yom…

How to Make Zoom Meetings More Secure and Protect Your Privacy

  Zoom calls remain an essential part of remote work and digital communication, but despite their convenience, they are not entirely private. Cybercriminals can exploit vulnerabilities to steal sensitive information, intercept conversations, or access meeting data. However, several practical measures…

Proxy Servers: How They Work and What They Actually Do

When browsing online, your device usually connects directly to a website’s server. However, in certain cases, especially for privacy, security, or access control — a proxy server acts as a go-between. It stands between your device and the internet, forwarding…