Blog

213 Results / Page 2 of 22

Background
How Cryptocurrency Is Changing Cyber Security

todayNovember 26, 2024

close

Computer Forensic Expert joe h

How Cryptocurrency Is Changing Cyber Security

Computer Forensics Company: One of the most prominent features of cryptocurrency is its underlying technology—the blockchain. The blockchain serves as the backbone that powers all cryptocurrencies, allowing for these digital assets to connect to other networks and computers seamlessly. While there are undeniable security advantages of cryptocurrency, such as its ...

DOJ: Man hacked networks to pitch cybersecurity services

todayNovember 26, 2024

close

Computer Forensic joe h

DOJ: Man hacked networks to pitch cybersecurity services

Digital Forensics: A Kansas City man has been indicted for allegedly hacking into computer networks and using this access to promote his cybersecurity services. According to the Department of Justice, Nicholas Michael Kloster, 31, of Kansas City, Missouri, breached two computer networks, a health club business and a nonprofit organization. According ...

Over 2,000 Palo Alto firewalls hacked using recently patched bugs

todayNovember 22, 2024

close

Computer Forensic joe h

Over 2,000 Palo Alto firewalls hacked using recently patched bugs

Digital Forensics: Hackers have already compromised thousands of Palo Alto Networks firewalls in attacks exploiting two recently patched zero-day vulnerabilities. The two security flaws are an authentication bypass (CVE-2024-0012) in the PAN-OS management web interface that remote attackers can exploit to gain administrator privileges and a PAN-OS privilege escalation (CVE-2024-9474) ...

T-Mobile confirms it was hacked in recent wave of telecom breaches

todayNovember 17, 2024

close

Computer Forensic joe h

T-Mobile confirms it was hacked in recent wave of telecom breaches

Digital Forensics: T-Mobile confirms it was hacked in the wave of recently reported telecom breaches conducted by Chinese threat actors to gain access to private communications, call records, and law enforcement information requests. “T-Mobile is closely monitoring this industry-wide attack, and at this time, T-Mobile systems and data have not been ...

 


LOGO

 

  • info@thorsolution.com


Products


Company


Contacts

Support