Month: April 2022

The U.S. Cybersecurity and Infrastructure Security Agency (CISA), along with the Federal Bureau of Investigation (FBI) and the Treasury Department, warned of a new set of ongoing cyber attacks carried out by the Lazarus Group targeting blockchain companies. Calling the activity cluster TraderTraitor, the infiltrations involve the North Korean state-sponsored advanced persistent threat (APT) actor
0 Comments
Intelligence agencies have unearthed a cybersecurity breach by military officials which is suspected to be linked to espionage-related activities by a neighbouring country. Responding to an ANI query on the cybersecurity breach issue, defence sources said: “The military and intelligence agencies have unearthed a cybersecurity breach by some military officials, which is likely to be
0 Comments
A Standard Missile-3 (SM-3) launches from the U.S. Navy’s USS Lake Erie at a non-functioning National Reconnaissance Office satellite on Feb. 20, 2008 as an anti-satellite weapons U.S. Department of Defense The United States government has committed to ending the practice of anti-satellite missile tests, Vice President Kamala Harris announced on Monday, urging other nations
0 Comments
India’s manufacturing push, backed by favourable policies, is timely and positions the country strongly to grab a massive opportunity in the electronics hardware space amid COVID-induced supply chain disruptions and global trust deficit around China, according to HCL co-founder Ajai Chowdhry. Chowdhry – who is part of the IT ministry-constituted advisory panel of experts that
0 Comments
How well do your Linux security practices stack up in today’s challenging operating environment? Are you following the correct processes to keep systems up-to-date and protected against the latest threats? Now you can find out thanks to research independently conducted by the Ponemon Institute. The research sponsored by TuxCare sought to understand better how organizations
0 Comments
We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 – 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today! A new global survey of 600 CIOs and IT decision-makers commissioned by Salesforce’s MuleSoft reveals that organizations find it challenging to attract and retain
0 Comments
An 18-month-long analysis of the PYSA ransomware operation has revealed that the cybercrime cartel followed a five-stage software development cycle from August 2020, with the malware authors prioritizing features to improve the efficiency of its workflows. This included a user-friendly tool like a full-text search engine to facilitate the extraction of metadata and enable the
0 Comments