Email:

Phone No.

Whatsapp

Blog

TikTok Phishing Threatens to Delete Influencers’ Accounts
TikTok Phishing Threatens to Delete Influencers’ Accounts
TikTok Phishing Threatens to Delete Influencers’ Accounts
TikTok Phishing Threatens to Delete Influencers’ Accounts

TikTok Phishing Threatens to Delete Influencers’ Accounts

TikTok Phishing Threatens to Delete Influencers’ Accounts Researchers have observed a new phishing campaign primarily targeting high-profile TikTok accounts belonging to influencers, brand consultants, production studios, and influencers’ managers. Abnormal Security researchers who spotted the attacks, observed two activity peaks while observing the distribution of emails in this particular campaign, on October 2, 2021, and on

Victims of $2 Billion BitConnect Fraud to Get back $57 million

Victims of $2 Billion BitConnect Fraud to Get back $57 million U.S. law enforcement authorities will start liquidating roughly $57 million worth of cryptocurrency seized from the now-defunct BitConnect crypto exchange to provide some restitution to defrauded investors. The amount pales compared to the $2 billion that BitConnect admins swindled from American and foreign investors during its

US, UK Warn of Iranian Hackers Exploiting Microsoft Exchange, Fortinet

US, UK Warn of Iranian Hackers Exploiting Microsoft Exchange, Fortinet US, UK, and Australian cybersecurity agencies warned today of ongoing exploitation of Microsoft Exchange ProxyShell and Fortinet vulnerabilities linked to an Iranian-backed hacking group. The warning was issued as a joint advisory released by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI),

CISA Releases Cybersecurity Response Plans for Federal Agencies

CISA Releases Cybersecurity Response Plans for Federal Agencies The Cybersecurity and Infrastructure Security Agency (CISA) has released new cybersecurity response plans (known as playbooks) for federal civilian executive branch (FCEB) agencies. CISA’s newly published operational procedures are designed to streamline the process of mitigating security vulnerabilities and responding to incidents with the help of easy-to-read

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us