Cyberthreats Around Valentine’s Day

Cyberthreats Around Valentine’s Day

Valentine’s Day is a time for love in any way, but it can also be a time of increased cyberthreats. Cybercriminals take advantage of this festivity to launch phishing and malware attacks and other attacks against unsuspecting victims. Know the top cyberthreats around Valentine’s Day and how to be protected from them. Read: The Hive […]

The Hive Ransomware Seizure

The recent seizure of the Hive ransomware operation’s Tor payment and data leak site, as part of an international law enforcement operation, has shown how many agencies around the globe can work together to infiltrate different infrastructure of cybercriminals gangs. Read the following lines to know all the details. Read: Colombian Company Audifarma Suffers Cyberattack […]

Colombian Company Audifarma Suffers Cyberattack

Audifarma

Audifarma, one of the largest drugstore chains in Latin America, recently suffered an external cyberattack that forced them to disable their physical and virtual servers to protect the organization’s and users’ information, taking their website and app are also out of service. This article will explain the details of the attack, the response from Audifarma, […]

A Credential Stuffing Attack Affected PayPal Accounts

Credential Stuffing

PayPal recently suffered a large-scale credential stuffing attack with thousands of accounts compromised with credential stuffing, a type of cyber attack which uses stolen usernames and passwords taken from other data breaches to gain access to online accounts. This article will explain Credential Stuffing and how PayPal accounts were affected by it. Read: T-Mobile suffers […]

T-Mobile suffers an API data breach

API data breach

Data breaches have become a common occurrence in the digital age. This time, it’s T-Mobile in the news for the wrong reasons, as hackers have managed to access the data of 37 million accounts of prepaid and postpaid clients belonging to the company. Everything was due to an API data breach. Learn more with the […]

University of Duisburg-Essen in Germany is the new victim of Vice Society

University of Duisburg-Essen

In November last year, the University of Duisburg-Essen (UDE) in Germany suffered a system breach. This breach was so great that it forced the institution to rebuild its IT infrastructure again, which is still ongoing today. After almost two months, the Vice Society group claims its authorship, publishing the stolen documents on its Tor site. […]

Fire Rescue Victoria in Australia are the new victims of the Vice Society group

Fire Rescue Victoria

The Vice Society group was one of the most active in 2022 and one of the most damaging with its Ransomware attacks. Its latest victim was the Fire Rescue Victoria, a state in Australia. Although the emergency services were not affected, their internal system was the one that took the biggest hit. Read all the […]

The Des Moines school district in Iowa is the new victim of a cyberattack

Des Moines

The Des Moines school district is the largest one in Iowa, but alarms rang on Monday due to unusual activities in their digital systems. With the number of schools, employees, and students under its care, the concern that this attack implies is more than understandable. Read all the details with the following lines. Activities in […]

Data of more than 200 million Twitter accounts was leaked

200 million Twitter accounts

These days Twitter has been under the spotlight, and not in a good way. There are many reasons, but the last one is the appearance of the data of more than 200 million Twitter accounts in a forum, where the emails of the same are revealed. This incident follows in the footsteps of the news […]

Security measures to prevent cyberattacks

security measures

Nowadays, people communicate using the Internet through remote work, systems management, and online business management. Certainly, the Internet has become a necessity for people in business, students, and professionals from different areas. Therefore, it is a priority to consider security measures to protect devices, programs, and systems involved in online communications. Read the following lines! […]