Australia’s national carrier, Qantas, finds itself potentially entangled in a complex web spun by a notorious group known as Scattered Spider.
Continue ReadingAttacks
Qantas Data Breach Victims Notified
Silence from Qantas regarding the massive data breach that has potentially exposed the personal information of up to six million Australians.
Continue ReadingQantas Cyberattack
Qantas, Australia’s national airline, has confirmed it is investigating a major cyberattack that could potentially affect up to 6 million of its customers.
Continue ReadingHannaford’s Company Data Breach
A recent filing with the Maine Attorney General’s office has revealed the significant scope of a data breach at Ahold Delhaize USA.
Continue ReadingHawaiian Airlines Cyber Attack
Hawaiian Airlines, the iconic carrier connecting paradise to the world, has announced it’s grappling with a cyber attack.
Continue ReadingEx-Student Charged in Cyber Attack
A former student of Western Sydney University (WSU) has been arrested and charged in connection with a series of cyber attacks that targeted the institution.
Continue ReadingThird Party Risk in Cybersecurity
The third party risk in cybersecurity. This refers to the potential threats posed by external entities who have access to systems, networks, and sensitive data.
Continue ReadingUnderstanding DDoS Attack Tools
Distributed Denial of Service (DDoS) attacks stand out for their potential to swiftly overwhelm networks and render systems unusable.
Continue ReadingDeepfake Detection is Critical
Within the internet lurks the threat of the deepfake. These manipulations of audio and visual content pose a significant challenge to national security.
Continue ReadingSocial Engineering Defending
One of the most vulnerable points in any security system isn’t technological it’s the human element. This is where social engineering comes into play.
Continue ReadingMalware Understanding the Threat
Malware short for malicious software, is an umbrella term encompassing any software designed to intentionally cause damage or disrupt computer systems.
Continue ReadingMitigating DDoS Attacks
The reliance on the internet also makes us vulnerable to various threats, one of the most disruptive being the Distributed Denial-of-Service (DDoS) attack.
Continue ReadingAvoiding Phishing Attacks
Our constant connectivity presents a ground for malicious actors looking to steal our personal information through a deceptive technique called phishing.
Continue Reading