Articles by

Paul Hamilton‏

North Korean hackers target crypto experts with fake Coinbase job offers

North Korean hackers use phoney Coinbase job offers to target cryptocurrency professionals. The renowned North Korean hacking...

After a hardcoded password leak, Atlassian expects Confluence app exploitation

Following the disclosure of information required to exploit a newly patched vulnerability, Atlassian has informed users...

Over 1 Billion Individual Data Leaked Due to Alleged Chinese Police Database Hacking

In a leak that, if verified, could be one of the biggest data breaches in history,...

This New Malware Is Now a Favorite among Ransomware Gangs

According to cybersecurity researchers, the bumblebee loader is now a darling in the ransomware ecosystem. A...

The Great Resignation in the Tech Sector and Tips to Solve the Issue

Human resource managers are finding it hard to close the growing skills disparities in their companies....

Attackers Can Exploit Critical Citrix ADM Vulnerability to Reset Admin Passwords

Citrix announced on Tuesday that Citrix Application Delivery Management (ADM) has a serious vulnerability that might...

Owl Labs Patches Awful Exposure in Video Conferencing Applications

Owl Labs, an organization that deals in video conferencing, has announced severe exposure to its devices,...

A Ransomware Group Claims to Have Breached the Foxconn Factory

Malicious hackers claim to have hacked into the network system of the Foxconn Baja factory in...

Want to stay up to date with the latest news?

We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!