In a surprising turn of events in the cybersecurity world, a recent breach has …
8base ransomware gang
-
-
Agile Practices in Retail IndustryAI in Cybersecurity
Someone hacked ransomware gang Everest’s leak site
by David Chenby David Chen 2 minutes readIn a recent turn of events that has left the cybersecurity world buzzing, it …
-
3D printing technologyAdvanced ManufacturingAI in CybersecurityAI in HealthcareAI in Legal Industry
Medusa Rides Momentum From Ransomware-as-a-Service Pivot
by David Chenby David Chen 2 minutes readIn the ever-evolving landscape of cybersecurity threats, one group has made waves with a …
-
AI in CybersecurityCybersecurity Risk ManagementInformation TechnologyOperational Technology (OT) Industry
Emerging Risks Require IT/OT Collaboration to Secure Physical Systems
by Samantha Rowland 2 minutes readIn today’s interconnected digital landscape, the convergence of Information Technology (IT) and Operational Technology …
-
AI in CybersecurityCorporate Data ProtectionIT securityPassword Management
Top 10 Most Used RDP Passwords Are Not Complex Enough
by Jamal Richaqrds 2 minutes readIn the realm of cybersecurity, Remote Desktop Protocol (RDP) serves as a crucial tool …
-
Academic CollaborationAI in CybersecurityThreat Intelligence
BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability
by Samantha Rowland 2 minutes readCybersecurity professionals and threat hunters recently made a significant breakthrough in the ongoing battle …
-
Agile Practices in Retail IndustryAI in CybersecurityE-Government Services
Malaysia PM Refuses to Pay $10M Ransomware Demand
by Jamal Richaqrds 2 minutes readIn a bold stance against cyber extortion, Malaysia’s Prime Minister firmly refused to pay …
-
AI in CybersecurityGovernment InitiativesRetail Security
Malaysia PM Refuses to Pay $10M Ransomware Demand
by Lila Hernandez 2 minutes readTitle: Malaysia PM Stands Firm: Refuses to Pay $10M Ransomware Demand In a bold …
-
AI in CybersecurityDigital TransformationEmployee Training
Navigating Cyber-Risks and New Defenses
by Priya Kapoorby Priya Kapoor 2 minutes readIn the realm of digital transformation, where industries have undergone revolutionary changes to enhance …
-
3D printing technologyAI in Cybersecurity
Hackers Repurpose RansomHub’s EDRKillShifter in Medusa, BianLian, and Play Attacks
by Priya Kapoorby Priya Kapoor 2 minutes readIn a recent development that has sent shockwaves through the cybersecurity world, a new …