Hot in more ways than one Adham Zahran Anyone even vaguely familiar with Egypt’s traditional music, big on sultry atmospheres and always arranged around big, brash rhythms, will not be surprised to hear the ancient country is a key one to watch for emerging electronic artists. It’s in their musical DNA. Acts like 3Phaz, whose […]
A cyber attack hit the Beirut International Airport Pierluigi Paganini January 07, 2024 A cyber attack hit the Beirut International Airport, Rafic Hariri (Lebanon), threat actors breached the Flight Information Display System (FIDS). Threat actors hit the Beirut International Airport Rafic Hariri in Lebanon and breached the Flight Information Display System (FIDS). Rafic Hariri International […]
Jan 08, 2024NewsroomCryptocurrency / Financial Crime Threat actors affiliated with the Democratic People’s Republic of Korea (also known as North Korea) have plundered at least $600 million in cryptocurrency in 2023. The DPRK “was responsible for almost a third of all funds stolen in crypto attacks last year, despite a 30% reduction from the USD […]
While patches have been released for some implementations, several projects using Kyber, including Signal, remain unpatched, and the impact of KyberSlash on users’ communications is still unclear.
Capital Health, a prominent healthcare organization based in New Jersey, recently faced a significant cybersecurity incident resulting in network outages towards the end of November 2023. Visitors to the organization’s website were immediately greeted with a ticker acknowledging the cyberattack on Capital Health, stating, “Capital Health recently experienced network outages due to a cybersecurity incident.” […]
Jan 06, 2024NewsroomCyber Espionage / Supply Chain Attack Telecommunication, media, internet service providers (ISPs), information technology (IT)-service providers, and Kurdish websites in the Netherlands have been targeted as part of a new cyber espionage campaign undertaken by a Türkiye-nexus threat actor known as Sea Turtle. “The infrastructure of the targets was susceptible to supply chain […]
Cybersecurity is an infinite journey in a digital landscape that never ceases to change. According to Ponemon Institute1, “only 59% of organizations say their cybersecurity strategy has changed over the past two years.” This stagnation in strategy adaptation can be traced back to several key issues. Talent Retention Challenges: The cybersecurity field is rapidly advancing, […]
AuthLogParser is an open-source tool tailored for digital forensics and incident response, specifically crafted to analyze Linux authentication logs (auth.log). The tool examines the auth.log file, extracting crucial details like SSH logins, user creations, event names, IP addresses, among others. It produces a concise summary that offers a clear overview of the activities documented in […]
The loanDepot cyberattack caused its IT systems to go offline and prevented customers from making online payments on their loans. The company confirmed the attack and is working with law enforcement and forensics experts to investigate.