Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Hacking

The Tri Counties Bank in Chico Gets Hacked by a Cyber Gang

Banks are entrusted with a great deal of personal information, money, and more by their customers. When a bank isn't able to secure those things, it's a major issue. This is an issue that the Tri-Counties Bank in Chico faced earlier this year. It wasn't money that the bank failed to protect, but customer information. The bank suffered from a serious cyber attack and lost confidential information in the process.

27 Most Notorious Hacks in History that Fall Under OWASP Top 10

Hacks and data leaks have affected many major players in recent years, including AT&T Vendor(9 Million accounts), T-Mobile (37 Million accounts), JD Sports(10 Million), MyDeal (2.2Million), Dropbox (nearly 69 million accounts), Flagstar bank (1.5 Million) and eBay (145 million). Those were bad. But not the worst. What are the most notorious hacks in history? They’re subject to debate, but these 27 attacks categorized under OWASP Top 10 would be strong candidates for the title.

Grazie Ragazzi-But it's not Ferrari who's saying it this time!

Ferrari’s woes seem to be continuing from F1 tracks to their data. And surprisingly, ransomware today encrypts files as fast as a Ferrari V8 goes from 0 to 60 mph. The current ransomware attack means cybercriminals now have access to confidential client data. Remarkably, this isn’t the first time Ferrari has been the victim of a ransomware attack; in October of last year, critical documents belonging to the brand were leaked online.

Different Types of Hackers: The Good, the Bad, and the Other

Hacking and hackers are terms that have become increasingly prevalent in our modern world. They are also often associated with negative connotations. By definition, hacking is using computer programming and technical skills to gain unauthorized access to computer systems, networks, or digital devices. Meanwhile, a hacker is someone who engages in these activities.

Independent Living Systems LLC Gets Hacked, Exposing 4 Million Patients

Independent Living Systems LLC is a healthcare facility provider for the elderly, physically challenged, and impaired. The company establishes short-term healthcare facilities for those that need extra care. If you or a loved one has utilized short-term living care at a facility, you may have relied on services from Independent Living Systems. Unfortunately, this healthcare provider recently suffered a massive cyber-attack.

How Ransomware as a Service (RaaS) Can Make Anyone a Hacker

Ransomware as a Service (RaaS) has been a growing trend in recent years, enabling anyone with an internet connection to become a hacker. In the past, launching a ransomware attack required a high level of technical expertise, but RaaS has lowered the barrier to entry, making it easier for anyone to launch a ransomware attack. So, how does RaaS work, and what are the implications for businesses and individuals?

Inside the mind of a hacker: Alternate identities and varied behavioral patterns

The boom of information technology opened an entirely new world of identities and opportunities. Most users’ journies in the cyber world started with the creation of an email address. That email address, which served as an online identity, eased communication between two users, breaking location barriers. Fast-forward to today: A user can create as many accounts as they want across different platforms on the internet, using a wide range of devices such as tablets, mobile phones, and laptops.

Hackers Get Information for More than 76,000 From Lawrence General Hospital

Lawrence General Hospital is a private facility located in Lawrence, Massachusetts. The hospital is a non-profit organization and offers patients throughout the surrounding area a variety of services. A total of 189 beds are contained within the facility, and it maintains a staff of approximately 2,000 people while earning about $281 million in annual revenue. This large-scale hospital recently suffered from a serious cyber attack that exposed many of its patients.

Hack Your Way To Your Dream Job In Cyber Security

Part 1 – Top Tips for Job Applications Firstly this week, we’ll be addressing a question posed by one of our masterclass attendees: “I am currently studying cyber security and I would love to know what you look for in candidates?” This is a great question and the answer is critical in helping you get into cyber security – I’ll give you my top tips in the first part of our masterclass.