The attackers also gained access to one of the customer service portals and stole confidential information.
The French firm Stormshield, which is a major provider of information security services and network security devices for the French government, reported that attackers gained access to...
The purpose of cybercriminals was to collect information and databases containing sensitive information.
The Lebanese Cedar cybercrime group, linked to the Lebanese militant organization Hezbollah, hacked a number of telecom operators and Internet service providers in the United States, Great...
The hackers turned out to be skilled and methodical operators who follow best practices to ensure the security of operations.
Information security specialists from Microsoft shared details about how hackers who attacked the SolarWinds supply chain managed to remain unnoticed and hide their...
Hackers used applications with privileged access to Microsoft Office 365 and Azure environments.
Security researchers from the information security firm Malwarebytes have confirmed that the cybercriminals responsible for the attack on the SolarWinds supply chain were able to access the...
Operation Enemies of the People began after the US presidential election and resumed during the storming of the Capitol.
The FBI reported on a malicious cyber operation called Enemies of the People ("Enemies of the People"), conducted by Iranian hackers against the US federal government, state...
Criminals could go unpunished because evidence collected from crime scenes was not recorded in the electronic system.
The UK government is assessing the possible consequences of a "technical error", due to which 150 thousand records were deleted from police databases, including fingerprints of...
Unauthorized access to the file-sharing service of the central bank of New Zealand was obtained by an unknown group of hackers, the press service of the regulator reported on January 10.
image
Unauthorized access to the file-sharing service of the central bank of New Zealand was obtained by an...
The database contains 1.3 million records of registered users.
According to the telegram channel of information leakage, an announcement about the sale of a database containing the data of 1.3 million registered users of the site appeared on the shadow forum hyundai.ru.
According to the...
The vulnerability affects many popular Zyxel products from the line of business-class devices, usually deployed in private corporate and public networks.
image
Devices have a hard-coded zyfwp account with an immutable password. A remote attacker who is not authenticated can access the affected...