Accenture has been hit by LockBit Ransomware demanding 50 million
Accenture, one of the leading IT services giant have been hit by the LockBit ransomware attack.
Accenture, one of the leading IT services giant have been hit by the LockBit ransomware attack.
Researchers from Armis have identified several zero-day flaws in the pneumatic tube system (PTS) in Swisslog Healthcare. This PTS mechanism is used in more than 3000 hospitals worldwide and could attackers to exploit and launch DOS attacks, steal credentials and gain access to critical information systems.
Italy’s Lazio is now vaccinating people against COVID-19 and the booking were happening good until hackers shut down Lazio region’s CED (database). The company that was organizing the COVID-19 booking around the Lazio region has now been compromised and their IT systems are shut down.
Cybercriminals have hacked into EA Sports internal slack channel, gained further access and downloaded FIFA 21 source code of 780 GB data and leaked it online after EA Sports denied to make the ransom.
The academic health system of the University of California, the UC San Diego Health has disclosed a data breach when their employees email accounts were compromised.
Social Media Platforms like Facebook, Instagram, WhatsApp, Twitter and others have always been a prime target for hackers for data breaches and data thefts. The latest popular social media platform called Clubhouse is known for the presence of top influencers […]
Jen Psaki, Press Secretary of the White House said that US will act on Russian hackers if the Russian government doesn’t take any action against those threat actors.
On Friday Jul 2nd right before the long weekend, many MSPs across the world got hit by a supply chain attack, orchestrated by the REvil ransomware group. The attack was executed using a RMM tool called Kaseya VSA, a popular one among the IT and MSP community.
A Russian state-sponsored group called Nobelium has breached into Microsoft’s support agent computer and accessed customer subscription information.
Multiple malicious packages turned developers’ workstations into crypto mining machines using the PyPi repository and involving in Python projects. It is found that all those malicious packages were deployed from one single account and have made developers to download the […]
Our vision is to deliver the trending and happening cyber events to the enthusiasts.
We believe in delivering educational and quality content for hassle-free understanding of the subject.
You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.