Blog categorized as Cyber Security
Threat Actors Attacking ICS Computers With Malicious Scripts and Phishing Pages
23.09.25 12:29 PM - Comment(s)
Over the first half of 2025, attackers have increasingly shifted to web-based attack vectors, exploiting legacy interfaces, weak authentication, and outdated software in operational technology environments.
Canada Police Dismantles TradeOgre Platform That Stolen 56 Million Dollars in Cryptocurrency
23.09.25 12:23 PM - Comment(s)
Canada’s law enforcement community has achieved a landmark victory in the fight against illicit finance with the dismantling of TradeOgre, a Tor-based cryptocurrency exchange that facilitated the theft and laundering of over 56 million dollars in digital assets.
Oxford County Responds to Cyberattack
23.09.25 12:21 PM - Comment(s)
cyberattack on Oxford County’s information system
Top 10 Best Autonomous Endpoint Management Tools in 2025
23.09.25 12:16 PM - Comment(s)
With escalating cyber threats and increasingly distributed workforces, autonomous endpoint management tools have become vital for automating device onboarding, software distribution, vulnerability patching, compliance, and more
The City of Yellowknife said it doesn’t appear any personal information was compromised during a cybersecurity incident last week. The City of Yellowknife reported a cybersecurity incident that affected access to internal systems and municipal online services starting September 15, 2025.