Email:

Phone No.

Whatsapp

Author: Privacy Ninja

CISA Warns Critical Infrastructure to Stay Vigilant for Ongoing Threats
CISA Warns Critical Infrastructure to Stay Vigilant for Ongoing Threats
CISA Warns Critical Infrastructure to Stay Vigilant for Ongoing Threats
CISA Warns Critical Infrastructure to Stay Vigilant for Ongoing Threats

CISA Warns Critical Infrastructure to Stay Vigilant for Ongoing Threats

CISA Warns Critical Infrastructure to Stay Vigilant for Ongoing Threats The Cybersecurity and Infrastructure Security Agency (CISA) warned critical infrastructure organizations today to strengthen their cybersecurity defenses against potential and ongoing threats. The federal agency also issued guidance to help executives and senior leaders proactively reinforce their orgs’ resilience against threats arising from malicious activity coordinated by nation-state-sponsored

State-sponsored Hackers Abuse Slack API to Steal Airline Data

State-sponsored Hackers Abuse Slack API to Steal Airline Data A suspected Iranian state-supported threat actor is deploying a newly discovered backdoor named ‘Aclip’ that abuses the Slack API for covert communications. The threat actor’s activity started in 2019 and targeted an unnamed Asian airline to steal flight reservation data. According to a report by IBM

AWS Down Again, Outage Impacts Twitch, Zoom, PSN, Hulu, Others

AWS Down Again, Outage Impacts Twitch, Zoom, PSN, Hulu, Others Amazon AWS is experiencing an outage that has impacted numerous online services, including Twitch, Zoom, PSN, Xbox Live, Doordash, Quickbooks Online, and Hulu. This ongoing outage started at approximately 7:43 AM PST and affects the US-WEST-1 and US-WEST-2 regions according to AWS’ status page. According to reports

Log4j Vulnerability Now Used by state-backed Hackers, Access Brokers

Log4j Vulnerability Now Used by state-backed Hackers, Access Brokers As expected, nation-state hackers of all kinds have jumped at the opportunity to exploit the recently disclosed critical vulnerability (CVE-2021-44228) in the Apache Log4j Java-based logging library. Also known as Log4Shell or LogJam, the vulnerability is now being used by threat actors linked to governments in

× Chat with us