This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.
Category: Global Cyber Affairs
CISA: Investigation Continues, No Broader Federal Impac...
There are no signs that the cyberattack that targeted the Treasury Department affected other government agencies, according to a s...
A Volkswagen Hack Makes 800K EV Customers' Data Public.
Data Belonging To Owners Of Electrical Vehicles Under The Company's Vw, Audi, Seat, And Skoda Brands Was Discovered By The Ethical...
US Sanctions State-Backed Hacking Campaigns with a Chin...
Integrity Technology Group, Incorporated, a cybersecurity firm based in Beijing, was sanctioned by the U.S. Treasury Department's ...
The African Union Improves It's Investigative Skills Re...
Cybercrime Significantly Affects African Nations' Finances, Especially Those With Inadequate Secured Infrastructure.
US Soldier Arrested in AT&T and Verizon Hacks
Two counts of unauthorized transfer of private phone records were allegedly brought against a US Army soldier who was apprehended ...
Organizations Banned for Using AI and Cyber Techniques ...
The U.S. Treasury's OFAC imposed sanctions on two organizations - one from Iran and one from Russia - for attempting to interfere ...
Chinese State Cybercriminals Target the US Treasury Dep...
The US Treasury Department recently disclosed to lawmakers that Chinese state-sponsored hackers breached their systems and stole d...
In 2025, Deepfakes and Quantum Attacks Could Affect Asi...
According to security experts, the Asia-Pacific region faces two major emerging cybersecurity challenges in 2025: the rise of deep...
422,000 People Are Affected by the Data Breach at Ameri...
Through a network of rehabilitation centers spread across several states, the Brentwood, Tennessee-based business offers both inpa...
$3 billion in funding for the FCC's rip-and-replace pro...
President Biden has enacted the 2025 National Defense Authorization Act, which includes significant provisions for various cyberse...
Acclaim is added by CISA USAHERDS's KEV Catalog Vulnera...
Based on evidence of active exploitation in the wild, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a hig...
The cyberwar raging in the Middle East has no end in si...
Since the outbreak of the Hamas-Israel conflict, the cyber warfare dimension has involved numerous threat actors and evolved signi...