Lossless Blog

Category: Uncategorized

  • Russian Hacker Group Takes Down Israeli Government Website

    A Russian hacker group, Killnet has revealed that they have taken over the Israeli official government website. Killnet released their official statement on the website that read “Government of Israel, you are to blame for this bloodshed.Back in 2022, you supported the terrorist regime of Ukraine.You betrayed Russia…Today Killnet officially informs you about itAll Israeli…

  • Are you Willing to Pay the High Cost of Credentials Compromise

    Compromised credentials Weak password policy often leaves organizations vulnerable to security compromise by threat actors. The question now is, does this complexity of passwords guarantee security? Studies have shown that bad actors already have access to billions of stolen credentials that can be used to compromise additional accounts by reusing those same credentials. To tackle…

  • 5 Cyber Hygiene Strategies to Help Prevent Cyber Attacks

    As technology becomes more inevitable in our everyday lives, especially as companies increasingly rely on technology and online systems to conduct their various businesses, meeting the minimum security standard becomes inevitable. Due to the ever-changing nature of cybercrime, it has become critical to pay attention to basic security hygiene. Read on to learn these standards…

  • Three out of Four Cyberattacks in the Education Sector are Associated with a Compromised on-premises User or Admin Accounts

    About 69% of educational institutions experienced a security incident within the last 12 months. A survey by Netwrix, a Texas-based IT security company, where about 1,610 IT and security professionals carried out a survey on the education sector across more than 100 countries has reported their findings. It has put the organizations in the education…

  • Tor Announces New Defence Mechanism Against DoS Attacks

    The Onion Browser (Tor) has announced the introduction of a Proof-of-Work, a new security mechanism to defend from attackers carrying out Denial of Service attacks. Tor has a span of users spread over the world who adopted their services for hiding their IP addresses and maintaining their privacy.The Onion services have always prioritized user privacy…

  • How APIs Aid the Growth of Business in 2023

    Importance of APIsApplication programming Interfaces (APIs) are the building block of the modern web, and they allow businesses to share data and functionality in a more secure and efficient way.Without APIs, businesses are limited in their ability to innovate and grow. They lack the ability to integrate with other systems, create new products and services,…

  • SpyNote Banking System Trojan used by Hackers to Attack European bank Customers

    There has been a massive wave of cyber attack on various European bank customers’ account in different European banks. Bank customers are being targeted with an Android banking Trojan called SpyNote which acts a spyware in a part of an aggressive campaign detected in June and July 2023. A spyware is a malicious software that…

  • Apple Sets New Rules in A bid to Prevent Fingerprinting and Data Misuse by Developers

    Apple Sets New Rules in A bid to Prevent Fingerprinting and Data Misuse by Developers

    Apple has rolled out a new policy requesting developers to submit reasons for requiring certain APIs in their apps starting later in the year with the release of iOS17, iPdOS17, mcOS17, tvOS17, and watchOS10 to prevent their abuse of data collection In the statement they released on 27th July, Apple said that they are committed…

  • Typo Error Leads to Leak of US Military Emails

    A typo error has seen US-sensitive Pentagon messages being redirected to a company that runs the Malian government’s internet domain Sensitive documents such as diplomatic documents, tax returns, passwords, and the travel details of top officials of the US Army have been misdirected to Mali via a “typo leak” The itinerary concerning the trip to…

  • An Indian hacker team called “NWH Security” have claimed to have leaked the database of 7 million Indonesians

    Indian hacker group has released the information of 7 million Indonesians which contain information like phone numbers, emails and other personal identifiable information’s The motive behind the attack is not yet known but maybe suspected to be as a show off or as a result of underlying political tension between the two countries. They announced…