Do you have an SQL server? Read this… the greatest new malware to affect your server!
DCSO CyTec analysts say they have identified over 285 servers infected with Maggie across 42 countries to date.
DCSO CyTec analysts say they have identified over 285 servers infected with Maggie across 42 countries to date.
The attack caused delays with surgeries, and patient care across the country. Some hospitals within the network currently have no way to access electronic health records for patients.
Investigations show that the hacker group BlackCat has published some documents on the dark web such as court records and speeding tickets. However, the hacking group claims they have up to 4 TB of stolen data.
School district officials in response had shut down most of their operating computer systems in order to mitigate the attack. However, that did not stop the ransomware group from stealing files. Preliminary investigations believe that a system used by the facilities department was what allowed the hackers access.
ALPHV, also known as the hacker group BlackCat, has claimed alleged responsibility for breaking into the US Defense Contractor firm NJVC.
This years theme is “See Yourself in Cyber” where the goal is for everyone to see their own role in protecting their bubble of cyberspace. By increasing individual awareness and best practices, a stronger cyber network of protection can be formed.
The threat of cyberattacks on small businesses is growing at an alarming rate. Most small businesses are not prepared against any form of cyber..
This month IHG became victims of a cyberattack. The hotel group includes 17 chains and over 6,000 hotels across 100 countries which includes brand names like Holiday Inn, Crowne Plaza, and Regent.
Australian’s have woken up to a cybercrime nightmare. Optus, a major telecommunications company that serves Australia, has been breached..
On Friday Sept 16th, Uber confirmed that it had been victim of a major cyber security breach. Uber revealed that the hack was completed by an 18 year old, who gained internal access to databases and systems. The teen used social engineering to trick an employee into giving up confidential information.