Category: EN

Misconfigured AWS Cloud Instances Lead to Sensitive Data Breaches

  Misconfigured cloud instances have once again enabled cybercriminals to steal sensitive data, including credentials, API keys, and proprietary source code. This time, numerous Amazon Web Services (AWS) users fell victim, highlighting a lack of understanding regarding the shared responsibility…

The Intersection of Travel and Data Privacy: A Growing Concern

  < p style=”text-align: justify;”>The evolving relationship between travel and data privacy is sparking significant debate among travellers and experts. A recent Spanish regulation requiring hotels and Airbnb hosts to collect personal guest data has particularly drawn criticism, with some…

Lynx Ransomware Breach Targets Romania’s Electrica Group

  The Romanian National Cybersecurity Directorate (DNSC) has confirmed that the Lynx ransomware gang successfully breached Electrica Group, a leading electricity supplier in Romania. About Electrica Group Electrica Group, initially part of the National Electricity Company (CONEL) in 1998, became…

New Research Uncovered Dark Internet Service Providers Used For Hacking

Bulletproof hosting services, a type of dark internet service provider, offer infrastructure to cybercriminals, facilitating malicious activities like malware distribution, hacking attacks, fraudulent websites, and spam.  These services evade legal scrutiny, posing a significant challenge to global cybersecurity. Understanding and…

Reyee OS IoT Devices Compromised: Over-The-Air Attack Bypasses Wi-Fi Logins

Researchers discovered multiple vulnerabilities in Ruijie Networks’ cloud-connected devices. By exploiting these vulnerabilities, attackers can remotely compromise access points, gain unauthorized access to internal networks, and execute arbitrary code on affected devices.  The “Open Sesame” attack demonstrates a practical scenario…

Benefits of Network Monitoring Systems

Maintaining a resilient, secure, and efficient network infrastructure is more important than ever. Network monitoring systems, which encompass both hardware and software tools, play a pivotal role in achieving this… The post Benefits of Network Monitoring Systems appeared first on…

Addressing the Disconnect in External Attack Surface Awareness

External vulnerability scans have become a staple in the cybersecurity toolkit of most organizations. Similar to a penetration test, external scans are designed to discover open ports and internet exposed assets including websites, servers, APIs, and other network endpoints to…

Legacy VPNs: A Ticking Time Bomb for Modern Organizations

In an era defined by the exponential growth of digital transformation, traditional Virtual Private Network (VPN) solutions have become a significant liability for modern organizations.  While VPNs were once heralded as a secure method of enabling remote connectivity, they are…

Tibber – 50,002 breached accounts

In November 2024, the German electricity provider Tibber suffered a data breach that exposed the personal information of 50k customers. The data included names, email addresses, geographic locations (city and postcode) and total spend on purchases. The data was provided…