The Biden administration plans to implement a national cybersecurity strategy. This will require comprehensive regulation of the country’s critical infrastructure. This will help to…
Cybersecurity Law
UniCC the largest dark web market for stolen cards, shuts down
The largest dark web marketplace for stolen credit and debit cards, UniCC has stated that it’s shutting down its operations. Since 2013, UniCC has…
Google, Microsoft, and Oracle has most vulnerabilities in early 2021
Google holds the top opening with more than 547 weaknesses, Microsoft is on number two with 432 undesirable openness occurrences and Oracle is on…
Texas Right to life website expose Job applications
It was discovered that hundreds of job applicants’ personal information had been compromised due to a glitch on Texas Right to Life website that…
Lojas Renner, Brazilian largest clothing chain hit by ransomware
Lojas Renner, Brazil’s biggest clothing retail chain, said it experienced a ransomware assault that affected its IT foundation and brought about the inaccessibility of…
Poly Network asserts hacker returned $600 Million stolen
An epic, just as unusual crypto heist story, appears to have arrived at its end. Poly Network, Decentralized Finance(DeFi) stage, declared the attackers that…
Data privacy law passed by China
NEW DELHI: In a bid to fix power over how organizations – especially tech goliaths – gather and handle their clients’ data, China passed…
WhatsApp Messages a carrier for Wormable Netflix Malware
Security analysts have found new malware cloaked as a Netflix application, intended to spread worm-like over the users’ WhatsApp messages. The wormable malware in…
Intel accused: Tracing user activity on the website for wiretapping laws
A class-activity suit in Florida blames the tech monster Intel for unlawfully catching correspondence by utilizing meeting replay programming to catch the interaction of…
Cashalo Data Breach, Hackers Strikes on Filipino Cash Loan App
Filipino online cash loan app Cashalo victimized in a data breach attack that entailed database records being peddled on the dark web. Detected by…