hackers

Manufacturing sector turns into a testing ground for ransomware hackers

Sophos threat researchers have uncovered a disturbing trend: ransomware hackers are increasingly focusing on the manufacturing sector as a key target. This shift is due in part to the sector’s reliance on critical operational technology (OT) that is deeply intertwined with the broader supply chain. As a result, manufacturers face immense financial pressure when these […]

How hackers can abuse Chrome data — and what you can do about it

Chrome browsers store a surprising amount of information to make browsing convenient: saved passwords, cookies, auto-fill entries, browsing history, cached pages, synced bookmarks, extensions, and local site data. In the wrong hands that data becomes a rich source of intelligence about people, organizations, and their digital habits. This article explains, at a high level, what […]

Microsoft admits that hackers are exploiting its Azure Blog Storage

Until now, most companies have refrained from acknowledging that their services were exploited by hackers. However, Microsoft, the tech giant from the United States, has publicly admitted that vulnerabilities in its cloud infrastructure allowed cybercriminals to gain unauthorized access to sensitive data. According to the company, certain account misconfigurations and flaws within its automated systems […]

What Can Hackers Do With Leaked or Stolen Data

In the digital age, data is one of the most valuable commodities. From email addresses to bank account details, every bit of personal and corporate information can be exploited in one way or another. When hackers gain unauthorized access to this data, the consequences can be far-reaching, both for individuals and organizations. But what exactly […]

China hackers start crashing US smart phones

In recent times, cybercriminals have been evolving at an alarming rate, adapting their tactics to exploit vulnerabilities in mobile devices used by high-profile targets, including government officials, politicians, businessmen, and even military personnel. This rising wave of sophisticated cyberattacks was highlighted by a major breach discovered by cybersecurity experts from iVerify. According to their findings, […]

How to identify hackers sitting in a computer network

Cybersecurity threats are an ever-present danger in today’s interconnected world, and one of the most insidious types of breaches involves hackers gaining access to a computer network and remaining undetected for long periods. These attackers, often referred to as “advanced persistent threats” (APTs), infiltrate networks, quietly lurking while they steal sensitive data, deploy malware, or […]

Motivations for Hackers to launch Cyber Attacks

These days, in this interconnected world, cyber attacks have become a significant threat to businesses, governments, and individuals alike. The motivations behind these attacks are varied, ranging from financial gain to political agendas, and the methods used by hackers are constantly evolving. Understanding why hackers launch cyber attacks can help organizations and individuals better defend […]

Defending Against Hackers in the Public Sector Is a Different Beast

The general perception of hackers is that they’re Mr. Robot-esque renegades who utilize futuristic technologies in order to single-handedly take down monolithic foes, like multinational corporations or entire governments. The reality is more mundane. Most malicious actors choose the path of least resistance, such as straightforward phishing attempts, in order to acquire credentials that grant […]

Details of Ransomania and iOS Face ID Scans stolen by hackers

Ransomania, an Innovative Tool Developed by Cyberint to Combat Ransomware Threats The global menace of ransomware continues to plague companies of all sizes and industries. To effectively counter this threat, it is crucial to raise awareness among individuals and organizations and equip them with the necessary tools to defend against such attacks. In response to […]

The Insider Threat: Can Employees Pose a Greater Risk than Hackers

In the ever-evolving landscape of cybersecurity, organizations face a multitude of threats that can compromise their sensitive data and operations. While external threats from hackers and cyber criminals are well-recognized, there’s an often-underestimated risk that originates from within – the insider threat. This article explores the potential dangers posed by employees and examines whether they […]

Share this page