Empowering Cyber Resilience: Your source to Security Insights and Updates
Information Security News
Data Breach Exposes Internal Files of Pentagon IT Provider Leidos
Hackers have released internal documents from Leidos Holdings Inc, a major IT services provider for the U.S. government. According to Bloomberg News, the breach involves data taken during a previous incident affecting a system from Diligent Corp., which Leidos uses....
Planes grounded worldwide due to a Windows failure
There’s been a global computer outage in the morning of July 19. It looks like the problem started when Windows users ran an update for their computers. After the computer updates, it shows a blue screen with an error message. The problem appears to be a flaw in...
AT&T’s Costly Move: $370,000 Ransom Paid to Delete Customer Info
AT&T recently disclosed that it paid a hacker over $370,000 to delete stolen customer data following an April data breach. This incident exposed the call and text records of nearly all AT&T customers, including phone numbers and call counts. After the breach,...
Cyber Resilience in Action: Ukrainian Team Protected During European Championship Match
A Dutch cybersecurity team played a crucial role in building cyber resilience to protect the Ukrainian football team during their European Championship match in Düsseldorf. By implementing advanced security measures, they prevented pro-Russian hackers from disrupting the event. Discover the proactive steps taken by Dutch Eye Security to ensure a seamless and secure match experience, and understand the growing importance of cyber resilience in sports events.
Malicious jQuery Versions Spread Through npm, GitHub, and jsDelivr
Unknown hackers are spreading infected jQuery packages on npm, GitHub, and jsDelivr in a sophisticated supply chain attack. These packages, created and published manually, contain malware hidden in the ‘end’ function of jQuery, which sends website form data to a remote server. With 68 affected packages, this attack highlights the importance of using trusted sources for your code dependencies.