-
Posted On Uncategorized
TCE Cyberwatch: From Ransomware to Deepfakes, This Week’s Top Cybersecurity Threats
This week’s TCE Cyberwatch delves into a range of pressing cybersecurity issues impacting the world today. From the rise of…
-
Posted On Uncategorized
2024 Is The Year of Elections… And Disinformation
By Roman Faithfull, Cyber Intelligence Lead, Cyjax 2024 will see more elections than any other year in history: the UK,…
-
Posted On Uncategorized
Future-Proofing the Workforce: How Skilling is Cultivating Next-gen Tech Talent
By Lakshmi Mittra, SVP and Head, Clover Academy In the rapidly changing and dynamic tech environment of today, future-proofing the…
-
Posted On Uncategorized
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Cybersecurity researchers have discovered a targeted operation against Ukraine that has been found leveraging a nearly seven-year-old flaw in Microsoft Office to…
-
Posted On Uncategorized
Bogus npm Packages Used to Trick Software Developers into Installing Malware
An ongoing social engineering campaign is targeting software developers with bogus npm packages under the guise of a job interview to trick…
-
Posted On Uncategorized
🏴☠️ Ransomhub has just published a new victim : polaris-SOLUCIONES TECNOLÓGICAS PARA EMPRESAS — polaris.es
Visits: 86 Data Size: 165Gb Published: False
-
Posted On Uncategorized
🏴☠️ Cactus has just published a new victim : iddink.nl
Download link #1: https://***************.onion/IDDINKNL/PROOFMirror: https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/IDDINKNL/PROOFDATA DESCRIPTIONS: Personal identifying information, financial documents, customer data, database exports, various confidential documents, corporate correspondence,…