Resources
Ways to protect HR data and avoid penalties for data breaches
There are many ways to protect HR data, and organisations benefit from learning how to properly harness them.
There are many ways to protect HR data, and organisations benefit from learning how to properly harness them.
The Ransom Disclosure Act would give victims 48 hours to report payments Victims of ransomware attacks in the United States may soon have to report any payments to hackers within 48 hours, according to a new legislation proposal titled the ‘Ransom Disclosure Act’. The bill was drafted by U.S. Senator Read more…
Fired IT Admin Revenge-hacks School By Wiping Data, Changing Passwords A 29-year old wiped data on systems of a secondary school in the U.K. and changed the passwords at an IT company, in retaliatory cyber attacks for being fired. As a result of his actions, the school’s systems could no Read more…
Google To Auto-enroll 150 Million User Accounts Into 2FA Google announced today that they plan on auto-enrolling 150 million accounts into two-factor authentication by the end of 2021. To protect Google accounts from unauthorized access, it is possible to enroll in an optional security feature called two-factor authentication, or as Read more…
The Telegraph Exposes 10 TB Database With Subscriber Info ‘The Telegraph’, one of the UK’s largest newspapers and online media outlets, has leaked 10 TB of data after failing to properly secure one of its databases. The exposed information includes internal logs, full subscriber names, email addresses, device info, URL Read more…
Epic Games Now Requires Epic Online Services – How to Install Epic Games now requires users to install Epic Online Services to properly use the Launcher. Here’s how to fix the blank screen that is preventing users from installing this new service. When users launch the Epic Games Launcher, they Read more…
Apache Fixes Actively Exploited Zero-day Vulnerability, Patch Now The Apache Software Foundation has released version 2.4.50 of the HTTP Web Server to address two vulnerabilities, one of which is an actively exploited path traversal and file disclosure flaw. The Apache HTTP Server is an open-source, cross-platform web server that is Read more…
Ransomware Gang Encrypts VMware ESXi Servers With Python Script Operators of an unknown ransomware gang are using a Python script to encrypt virtual machines hosted on VMware ESXi servers. While the Python programming language is not commonly used in ransomware development, it is a logical choice for ESXi systems, seeing Read more…
New UEFI Bootkit Used To Backdoor Windows Devices Since 2012 A newly discovered and previously undocumented UEFI (Unified Extensible Firmware Interface) bootkit has been used by attackers to backdoor Windows systems by hijacking the Windows Boot Manager since 2012. Bootkits are malicious code planted in the firmware (sometimes targeting UEFI) Read more…
Facebook: Outage Caused By Faulty Routing Configuration Changes Facebook says that yesterday’s worldwide outage was caused by faulty configuration changes made to its backbone routers that brought all its services to a halt. “Our engineering teams have learned that configuration changes on the backbone routers that coordinate network traffic between Read more…
Click one of our contacts below to chat on WhatsApp