US Military Emails Leaked Massively Due to the Typo
Email letters sent to the US military addresses ended up on similarly-named…
How to Protect Your Digital Footprint
The modern business world has been greatly advanced by the internet. Its…
What is eWallet? How to Protect Your eWallet
During a time of crisis, Americans turned to digital wallets called eWallets…
BlackCat ransomware gang publishes leaked data on the clear web site
BlackCat/ALPHV group recently announced on its victim shaming and extortion website that…
RaidForums shutdown as the result of Operation Tourniquet
The chain of international law enforcement agencies - Europol, FBI, NCA and…
Vulnerability in macOS Leads to Data Leakage
Microsoft said that attackers could use a macOS vulnerability to bypass Transparency,…
Epik hoster hack affected 15 million users, not just the company’s clients
Last week, Anonymous hacktivists reported about hack of the database of the…
Anonymous hacktivists attacked the Epik hoster with the right-wing radical sites
Anonymous hacktivists attacked into the database of the domain registrar and hoster…
List of suspects in terrorism that are monitored by the FBI leaked to the network
A copy of the FBI's Terrorist Screening Center (TSC) list has Leaked…
Ukraine’s largest IT company SoftServe has been attacked by a ransomware
One of the largest IT companies in Ukraine, SoftServe (number 2 in…
Analysts say that over 5 billion unique credentials can be found on the black market
Analysts at Digital Shadows have estimated that there are currently more than…
Users seldom change passwords even after data leaks
Researchers from Carnegie Mellon University found that users seldom change passwords even…