Skip to content

Toyota shuts down operations following a suspected cyber-attack by Russia

Toyota suspended all its domestic factories on Tuesday following a cyber-attack that affected the supplier of plastic parts, Kojima Industries Corporation. “Due to a system failure at a domestic supplier (KOJIMA INDUSTRIES CORPORATION), we have decided to suspend the operation of 28 lines at 14 plants in Japan on Tuesday, March 1 (both 1st and 2nd shifts).

Russia-Ukraine conflict takes the hybrid warfare route, U.S. on high alert

Russia inflicted way more destruction on Ukraine than what made the headlines. As Russia continued to invade Ukraine, it simultaneously launched a series of cyberattacks against the country, and the initial targets were Ukrainian banks and government agencies. The newer sanctions by the U.S. and other NATO nations have not been successful in preventing Putin from continuing his invasion.

Four Cybersecurity Trends for 2022

On pace with the spread of the pandemic, cyberattacks exploded across industries in 2021. Hackers took advantage of vulnerabilities in remote work and the continued digitization of business processes to siphon millions of dollars. As we move into the new year, we’re seeing new threats on the horizon, as cybercriminals develop more accessible pathways to launch attacks, race to exploit automated technology, and even prey on the humans who use it.

Cybersecurity News Weekly Roundup (October 25-29)

Welcome to this week’s Weekly News roundup. Here we present the latest news and updates in the world of cybersecurity. From lawmakers pushing for better cybersecurity for the transport sector to fraudsters targeting Android users into premium subscription services without their consent, this week saw several cybersecurity incidents. Here is a rundown: A team of… Read More »Cybersecurity News Weekly Roundup (October 25-29)

U.S. Lawmakers Push for Better Cybersecurity for Transport Sector

Over the last year, there have been multiple instances where cybercriminals have targeted the U.S.’ transportation infrastructure. These include attacks against ferries, railways, and even oil supply chains. These attacks cause widespread disruption in the lives of ordinary citizens. A committee of lawmakers from the Department of Homeland Security will discuss industry-wide measures to improve… Read More »U.S. Lawmakers Push for Better Cybersecurity for Transport Sector

Howard University

Howard University Targeted by a Ransomware Attack

The prestigious Howard University, known for being a historically Black college and university, has become the newest high-profile U.S organization that has fallen victim to a ransomware attack.   According to a statement released by the University, “On September 3, the Howard University information technology team detected unusual activity on the University’s network. In accordance with… Read More »Howard University Targeted by a Ransomware Attack

Hacked data for sale

Kaseya Hack Solved? – Our Experts Find Kaseya Data on the Dark Web

News has spread that Kaseya, which suffered a ransomware attack, received a Universal decryption key from a trusted third party. There is confirmation from relevant authorities that there was no payment for the ransom. But does that mean that all is well? Why isn’t the cybersecurity industry celebrating the victory over this massive ransomware attack?… Read More »Kaseya Hack Solved? – Our Experts Find Kaseya Data on the Dark Web

DDoS Attack – What to Do Before Cyber Security Companies Take Over?

You are under a DDoS attack; what do you do now? At the outset, do not get hassled. If you have already appointed a cybersecurity provider, its experts will take care of it. However, if you do not have one, and until you call and get someone to take over your systems, and recover from… Read More »DDoS Attack – What to Do Before Cyber Security Companies Take Over?

Cybersecurity Awareness Among Employees – Compare Phishing VS Vishing VS Smishing

Cybercriminals evolve with time. They keep coming up with innovative techniques to penetrate networks and execute the intended fraud. Accordingly, phishing, vishing, and smishing have evolved as three prominent cybersecurity threats. Bad actors are continuously in pursuit of networks and users through emails (phishing), vishing (voice and phishing), and smishing (cell phone messages). A single… Read More »Cybersecurity Awareness Among Employees – Compare Phishing VS Vishing VS Smishing