Wednesday , January 8 2025

TimeLine Layout

April, 2023

  • 14 April

    After 10 Days, Western Digital’s My Cloud Finally Restored Following Hack

    Western Digital has finally restored the My Cloud service after more than a week following a hack, but those behind the breach claim to have stolen customer data. The My Cloud service returned on Wednesday, 10 days after Western Digital officially reported an outage that made the online storage platform …

    Read More »
  • 14 April

    Hyundai Hacked – Attackers Stole Car Owners’ Personal Details

    Hyundai reported a data breach that impacted car owners in Italy and France and people who booked their test drives. The company has warned that hackers accessed customers’ data. Hyundai owns roughly 3% of the market shares in Italy and France, selling nearly half a million vehicles a year in …

    Read More »
  • 14 April

    Wireshark 4.0.5 Released With New Protocol Support

    With improved protocol support, various bug fixes, and several enhancements, Wireshark has released version 4.0.5. On March 3, 2023, the most recent version of Wireshark 4.0.4 was made available; this is the second upgrade of this year. The open-source packet analyzer Wireshark is free to use. It is employed in developing software and …

    Read More »
  • 14 April

    Gartner unveils top cybersecurity predictions for 2023-2024

    Half of CISOs will formally adopt human-centric design practices into their cybersecurity programmes, while adoption of zero trust architecture will rise Fifty per cent of Chief Information Security Officers (CISOs) will adopt human-centric design to reduce cybersecurity operational friction; large organisations will focus on implementing zero-trust programmes; and half of …

    Read More »
  • 14 April

    Irrigation Systems in Israel Disrupted by Hacker Attacks on ICS

    The Jerusalem Post reported that hackers targeted water controllers for irrigation systems at farms in the Jordan Valley, as well as wastewater treatment control systems belonging to the Galil Sewage Corporation. Farms were warned by Israel’s National Cyber Directorate prior to the incident, being instructed to disable remote connections to these systems …

    Read More »
  • 13 April

    Security Best Practices by BGD e-GOV CIRT

    Password Policy best practices Create a strong, complex and long password. Use multi-factor authentication for login where possible. Avoid save password in browser. Generic best practices Do not install additional software or server roles on DCs Implement patch management. Use secure DNS services to block malicious domains Ensure business continuity …

    Read More »
  • 13 April

    Microsoft Bing introduces ChatGPT answers in search results

    Microsoft has introduced a new update to Bing.com that includes a significant change in its search results — the addition of ChatGPT responses to search queries. Instead of featured snippets, in some cases, users will now see Bing AI answers to their queries, with prompts to continue conversations with the …

    Read More »
  • 13 April

    Elon Musk: I’d Only Sell Twitter to Someone Who ‘Pursues Truth’

    Elon Musk is open to the idea of selling Twitter, but only if he was sure the person taking over “would vigorously pursue the truth.” Musk made the statement in a BBC interview(Opens in a new window) conducted on Twitter Spaces last night. He was asked whether he would sell Twitter if …

    Read More »
  • 13 April

    WhatsApp business payments tool rolled out in Brazil

    It took some time, as regulatory issues had to be solved, but Meta’s WhatsApp business payments tool is finally live in Brazil. The company chose the country as a key testing space for the new venture. The service, provided in partnership with payment processors including MercadoLibre’s Mercado Pago, Itau Unibanco’s …

    Read More »
  • 13 April

    Potential Outcomes of the US National Cybersecurity Strategy

    On March 1, 2023, the Biden administration published its National Cybersecurity Strategy. This is not an executive order, but an outline of how the administration will guide the evolution of cybersecurity at the national level. The federal government can only impose its wishes on federal agencies. It cannot impose those wishes at …

    Read More »

This will close in 6 seconds