Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Hacking

Anonymous Sudan: Religious Hacktivists or Russian Front Group?

The Trustwave SpiderLabs research team has been tracking a new threat group calling itself Anonymous Sudan, which has carried out a series of Distributed Denial of Service (DDoS) attacks against Swedish, Dutch, Australian, and German organizations purportedly in retaliation for anti-Muslim activity that had taken place in those countries.

The Tri Counties Bank in Chico Gets Hacked by a Cyber Gang

Banks are entrusted with a great deal of personal information, money, and more by their customers. When a bank isn't able to secure those things, it's a major issue. This is an issue that the Tri-Counties Bank in Chico faced earlier this year. It wasn't money that the bank failed to protect, but customer information. The bank suffered from a serious cyber attack and lost confidential information in the process.

27 Most Notorious Hacks in History that Fall Under OWASP Top 10

Hacks and data leaks have affected many major players in recent years, including AT&T Vendor(9 Million accounts), T-Mobile (37 Million accounts), JD Sports(10 Million), MyDeal (2.2Million), Dropbox (nearly 69 million accounts), Flagstar bank (1.5 Million) and eBay (145 million). Those were bad. But not the worst. What are the most notorious hacks in history? They’re subject to debate, but these 27 attacks categorized under OWASP Top 10 would be strong candidates for the title.

Grazie Ragazzi-But it's not Ferrari who's saying it this time!

Ferrari’s woes seem to be continuing from F1 tracks to their data. And surprisingly, ransomware today encrypts files as fast as a Ferrari V8 goes from 0 to 60 mph. The current ransomware attack means cybercriminals now have access to confidential client data. Remarkably, this isn’t the first time Ferrari has been the victim of a ransomware attack; in October of last year, critical documents belonging to the brand were leaked online.

Different Types of Hackers: The Good, the Bad, and the Other

Hacking and hackers are terms that have become increasingly prevalent in our modern world. They are also often associated with negative connotations. By definition, hacking is using computer programming and technical skills to gain unauthorized access to computer systems, networks, or digital devices. Meanwhile, a hacker is someone who engages in these activities.

Independent Living Systems LLC Gets Hacked, Exposing 4 Million Patients

Independent Living Systems LLC is a healthcare facility provider for the elderly, physically challenged, and impaired. The company establishes short-term healthcare facilities for those that need extra care. If you or a loved one has utilized short-term living care at a facility, you may have relied on services from Independent Living Systems. Unfortunately, this healthcare provider recently suffered a massive cyber-attack.

How Ransomware as a Service (RaaS) Can Make Anyone a Hacker

Ransomware as a Service (RaaS) has been a growing trend in recent years, enabling anyone with an internet connection to become a hacker. In the past, launching a ransomware attack required a high level of technical expertise, but RaaS has lowered the barrier to entry, making it easier for anyone to launch a ransomware attack. So, how does RaaS work, and what are the implications for businesses and individuals?

Inside the mind of a hacker: Alternate identities and varied behavioral patterns

The boom of information technology opened an entirely new world of identities and opportunities. Most users’ journies in the cyber world started with the creation of an email address. That email address, which served as an online identity, eased communication between two users, breaking location barriers. Fast-forward to today: A user can create as many accounts as they want across different platforms on the internet, using a wide range of devices such as tablets, mobile phones, and laptops.