Tag Multi-Factor Authentication

How Hackers Compromised a Major Repository, Endangering 13,000 Individuals

On December 18, 2025, Australia’s University of Sydney reported a significant cybersecurity breach, revealing that hackers compromised an online coding repository, extracting personal information belonging to thousands of staff, students, alumni, and donors. The university characterized the breached data as ‘historic,’ which has placed one of Australia’s leading academic institutions…

Read MoreHow Hackers Compromised a Major Repository, Endangering 13,000 Individuals

5 Essential Cybersecurity Steps for Every SMB

Fraud Management & Cybercrime, Governance & Risk Management, Multi-factor & Risk-based Authentication Practical Steps to Enhance Security and Resilience Sean D. Mack • December 17, 2025 Image: Shutterstock Leaders of small and mid-sized enterprises (SMEs) frequently assert, “We’re too small to be a target.” This misconception endangers their organizations, especially…

Read More5 Essential Cybersecurity Steps for Every SMB

Citrix Data Breach: Iranian Hackers Exfiltrate 6TB of Confidential Information

Massive Data Breach Exposed at Citrix, Targeting U.S. Government and Corporate Networks In a concerning revelation last weekend, Citrix, a prominent provider of enterprise software that serves the U.S. military, the FBI, and various governmental agencies, announced a significant data breach of its internal network. The intrusion, attributed to “international…

Read MoreCitrix Data Breach: Iranian Hackers Exfiltrate 6TB of Confidential Information

Minor Breaches, Major Consequences: The Legal Ramifications of Small Cyber Incidents | Constangy, Brooks, Smith & Prophete, LLP

Cyberattacks against high-profile corporations often dominate headlines, casting shadows over more subtle incidents that may not receive as much attention. However, breaches affecting smaller organizations are increasingly drawing legal scrutiny and regulatory attention. Recent trends indicate that no data breach is too insignificant to evade serious legal repercussions, particularly in…

Read MoreMinor Breaches, Major Consequences: The Legal Ramifications of Small Cyber Incidents | Constangy, Brooks, Smith & Prophete, LLP

Hackers Targeting Severe Zero-Day Vulnerability in SonicWall SMA 100 Devices

SonicWall has issued a critical alert regarding active exploitation efforts targeting a zero-day vulnerability in its Secure Mobile Access (SMA) 100 series devices. This vulnerability affects both physical and virtual SMA 100 10.x devices, covering models such as the SMA 200, 210, 400, 410, and 500v. This issue came to…

Read MoreHackers Targeting Severe Zero-Day Vulnerability in SonicWall SMA 100 Devices

SolarWinds Hackers Exfiltrated Source Code for Microsoft Azure, Exchange, and Intune

Microsoft Concludes Investigation into SolarWinds Hack: Key Findings Revealed On Thursday, Microsoft announced the completion of its investigation into the SolarWinds cyberattack. The company confirmed that while the attackers were indeed able to exfiltrate source code from its repositories, there is no evidence that they leveraged this breach to access…

Read MoreSolarWinds Hackers Exfiltrated Source Code for Microsoft Azure, Exchange, and Intune