Sunday , January 5 2025

International

Singapore-Based Absolute Telecom Allegedly Hit by Cyberattack

GhostR hacker claimed to hack Absolute Telecom PTE Ltd, a Singapore-based telecom company and stole 34 gigabytes of data including corporate information, accounting records, sales data, customer details, credit card information, and call records. In a post the bad actor claimed they infiltrated and compromised the company’s server networks on …

Read More »

CISA Releases Four Industrial Control Systems Advisories

ics

CISA released four advisories about Industrial Control Systems (ICS) on June 4, 2024. These advisories contain important information about security issues, vulnerabilities, and exploits related to ICS. ICSA-24-156-01 Uniview NVR301-04S2-P4 ICSA-23-278-03 Mitsubishi Electric CC-Link IE TSN Industrial Managed Switch (Update A) ICSA-22-172-01 Mitsubishi Electric MELSEC iQ-R, Q, L Series and …

Read More »

A Plan to Protect Critical Infrastructure from 21st Century Threats

Critical Infrastructure

On April 30th, the White House released National Security Memorandum-22 (NSM) on Critical Infrastructure Security and Resilience to update national policy on protecting and securing critical infrastructure from cyber and all-hazard threats. The memorandum recognizes the changed risk landscape and aims to collaborate with partners to identify and reduce sector, …

Read More »

Hacker Claim to compromise over 15 Asian telecom

tower

A large dataset belonging to BSNL, an Indian state-owned telecommunications company, has been put up for sale by cybercriminals on an underground forum. On May 27, 2024, it was discovered that “kiberphant0m” was selling unauthorized access to databases stolen from BSNL, as well as data from other Asian telecom companies …

Read More »

Chronon: a open-source data platform for AI/ML applications

CHORON

Chronon simplifies data computation and serving for AI/ML apps. Users define data features, and Chronon handles batch and streaming computation, scalable backfills, low-latency serving, correctness, consistency, observability, and monitoring. It allows you to utilize all of the data within your organization, from batch tables, event streams or services to power …

Read More »