BiBi-Windows Wiper Escalates Israel-Hamas Cyber Conflict
Cybersecurity experts have uncovered a significant development in the evolving landscape of cyber warfare. Originally observed as a Linux-based threat in the Israel-Hamas war, the...
IT professional, Social media scholar and a Crypto expert. If you have any comments, suggestions or questions feel free to contact me at sying.tien@thecoinspost.com and i will get back to you shortly.
53 Articles
Cybersecurity experts have uncovered a significant development in the evolving landscape of cyber warfare. Originally observed as a Linux-based threat in the Israel-Hamas war, the...
Scandinavian Airlines (SAS) suffered a cyberattack that caused its website to go offline and exposed some customer data. Users who tried to log into the...
Dynamic Application Security Testing (DAST) is a crucial aspect of modern software development and is used to identify security vulnerabilities in web applications. With the...
Cybersecurity is a critical issue for organizations of all sizes, and choosing the right solution is essential to protect against cyber threats, data breaches, and...
A Reddit has announced that a “sophisticated and highly-targeted” attack resulted in the theft of an employee’s credentials. On February 5th, hackers were able to...
Cybersecurity researchers at BlackBerry have uncovered a sophisticated cyber espionage campaign targeting Pakistan’s Navy, led by a previously unknown hacking group named “NewsPenguin.” The group’s...
Trend Micro has discovered a new malicious campaign that is targeting individuals in the Eastern European cryptocurrency industry through a fake employment ploy. According to...
An ex-employee of Ubiquiti, a network technology provider, admitted guilt on Thursday to multiple criminal charges. The individual pretended to be an anonymous hacker and...
A new cyber attack from Russia on Ukraine, using a previously unseen Golang-based data wiping tool called SwiftSlicer, has occurred. ESET identified the attack as...
The darkweb is an area of the internet that can be accessed only by using special software, such as the Tor browser. It is a...