Top Cyber Stories for April 2022 – Cyber Stories Funky Pigeon Cyber Attack Funky Pigeon, a UK online gifts and greetings cards store was the target of a cyber attack that saw the company suspend taking new orders and move its systems offline. The website had not resumed full operations as at May 3, about […] The post April 2022 Cybersecurity Roundup:...
Top Cyber Stories for March 2022 Russia-Ukraine War Continues in Cyberspace As the armed conflict following Russia’s invasion of Ukraine intensified through March, multiple cyberattacks purportedly linked to the war were reported. It was not just attacks on Ukrainian and Russian websites. Cyber incidents spilled over onto allies of either side. See...
Top Cyber Stories for February 2022 Another month. Another slew of cyberattacks. If anyone was under any illusion that 2022 would perhaps see a slowdown of cyberattacks unlike 2021, February decisively put that idea to rest. Attacks targeting a wide range of prominent organizations hit the news. Ukraine government and bank websites crash The tensions...
Top Cyber Stories for January 2022 Morgan Stanley’s $60 Million Settlement for Data Breach Financial services giant Morgan Stanley has agreed to pay $60 million to settle a data security class-action lawsuit. The lawsuit brought by about a dozen customers claimed the company had exposed their personal information when on two occasions, it failed to...
The Apache Log4j Vulnerability Also known as Log4Shell, the Apache Log4j vulnerability was THE cybersecurity news story of December and one of the most significant of 2021 and likely 2022. A flaw in the widely used Java logging library, it was first disclosed on December 9. The vulnerability was first discovered in Minecraft and allows […] The post...
A new 0-day vulnerability, formally known as CVE-2021-44228, was published on the NIST National Vulnerability Database on Friday, December 10. It is found in the Log4j Java library. Log4j is a popular open source logging library made by the Apache Software Foundation. The security vulnerability found in Log4j allows hackers to execute remote commands...
Vytvorte si vlastný informačný kanál
Ste pripravení to vyskúšať?
Začnite 14-dňovú skúšobnú verziu, kreditná karta sa nevyžaduje.