X Outage Disrupts Australian Users as Platform Goes Dark
X Outage Disrupts Australian Users During Peak Hours Summary:A major outage affecting X (formerly Twitter) has disrupted access for users […]
X Outage Disrupts Australian Users During Peak Hours Summary:A major outage affecting X (formerly Twitter) has disrupted access for users […]
A hacker breached Crunchyroll, compromising 6.8 million accounts by exploiting an Okta SSO. Extracted data includes emails, names, IPs, and more. The attacker demanded $5 million without response, leaving users’ data at risk. Discover protective steps every Crunchyroll user must take immediately to safeguard their accounts…
CISA mandates federal agencies to patch critical flaws in Cisco SD-WAN devices by February 27, 2026, due to active exploits. The directive targets vulnerabilities in SD-WAN Manager and Controller systems, alerting private businesses globally about the threats and urging immediate action to prevent breaches…
The UAE Cybersecurity Council warns of the rising threat of wiper malware, a malicious software that permanently destroys data, posing a significant risk to individuals and organisations. As cyberattacks escalate, understanding and mitigating these threats is crucial for safeguarding digital assets and protecting critical infrastructure…
A data breach at Starbucks exposed sensitive information of 889 employees, including Social Security numbers and banking details. The breach occurred between January and February. Starbucks offers 24 months of Experian IdentityWorks to assist affected employees, but additional precautions are essential for identity protection…
CISA is investigating a major cyberattack on Stryker by Handala Hack, a pro-Iranian group. This attack highlights the rising cybersecurity threat in critical sectors like healthcare and defense. Learn about the potential impact and essential protective measures to safeguard your business from these growing digital threats…
Federal agencies face urgent deadlines after CISA’s directive to fix Cisco SD-WAN flaws. Critical vulnerabilities in these systems are being actively exploited. Immediate action is urged to protect infrastructure. Private sector entities using Cisco SD-WAN are also advised to apply mitigations to prevent potential threats…
The recent Bell Ambulance data breach exposed sensitive personal and medical information of 238,000 individuals. The Medusa ransomware gang claimed responsibility for the attack, which compromised Social Security numbers, financial details, and health records. Find out how this impacts you and steps to safeguard your information…
CastleRAT is pioneering the use of Deno runtime—traditionally a trusted developer tool—for fileless malware execution. By leveraging steganography and living-off-the-land tactics, it achieves unprecedented evasion. This development highlights new challenges in detecting runtime abuses beyond traditional OS-level utilities like PowerShell…
A single Russian-speaking hacker exploited generative AI tools to breach over 600 FortiGate devices in 55 countries. This attack underscores how AI is transforming cybersecurity, lowering technical barriers and automating threats. Learn how GenAI fuels these cyber intrusions and discover five protective steps you can implement today…