Hackers & Threats

How Did Billbug Target Critical Sectors in Southeast Asia?

Hackers & Threats

How Did Billbug Target Critical Sectors in Southeast Asia?

In a shocking revelation, the Billbug group, linked to state entities, has unleashed a cyber-espionage campaign targeting Southeast Asia's critical sectors. From August 2024, operations extended to key industries, including government, telecommunicat

Hackers & Threats Are Russian Hackers Exploiting Email Vulnerabilities Globally?

In recent years, Russian hackers have drawn increasing scrutiny for their suspected involvement in high-profile cyber espionage campaigns. Operation RoundPress stands as a particularly alarming example, suspected to originate from the cyber group Fancy Bear. This campaign is believed to target

Are Russian Hackers Exploiting Email Vulnerabilities Globally?
Hackers & Threats Coinbase Fights Back Against Cyber Extortion with Bold Strategy

Coinbase, the largest cryptocurrency exchange in America, recently faced a cyberattack in which insiders provided sensitive customer information to cybercriminals. In response to the May breach, instead of paying the demanded $20 million extortion, Coinbase offered the same amount as a reward for

Coinbase Fights Back Against Cyber Extortion with Bold Strategy
Hackers & Threats Are Global Efforts Closing In on Ransomware Masterminds?

In a notable development, a 45-year-old foreign man was arrested in Moldova for allegedly orchestrating ransomware attacks that affected Dutch companies, causing significant damage. Of particular note is the attack on the Netherlands Organization for Scientific Research (NWO), which resulted in

Are Global Efforts Closing In on Ransomware Masterminds?
Hackers & Threats Are SAP Systems Secure Against Rising Cyber Threats?

SAP systems are crucial to many sizable enterprises worldwide, central to business operations across diverse sectors, including finance, supply chain management, and human resources. Their role in automating and streamlining complex processes makes them indispensable. The current landscape of the

Are SAP Systems Secure Against Rising Cyber Threats?
Hackers & Threats Mobile Security 2025: Advanced Defense for Evolving Threats

In today's rapidly advancing digital landscape, mobile devices are at the forefront, serving as vital components in both personal and professional environments. However, these devices, as they become increasingly integrated into our daily lives, present new challenges and threats that

Mobile Security 2025: Advanced Defense for Evolving Threats
Hackers & Threats How Are Chinese Hackers Exploiting SAP Vulnerabilities?

In an alarming development, a cyber espionage campaign led by Chinese state-backed hackers, known as "Salt Typhoon," has come to the fore, exploiting a critical vulnerability in SAP NetWeaver Application Server Java 7.5 systems. This flaw, designated as CVE-2024-4584, has been rated at a

How Are Chinese Hackers Exploiting SAP Vulnerabilities?
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address