Blog

  • All Post
  • Article
  • Development
  • Investment
  • Marketing
  • News
  • Strategies
New Rules Impact 500 Million Outlook Users

April 24, 2025/

Email has been both a blessing and a curse for billions of users. Unfortunately, it’s definitely been a blessing for hackers and a curse for consumers who receive their phishing attacks, malware attachments and more. Although highly-targeted “spear” phishing attacks are increasingly seen as the way to go by sophisticated threat actors, there’s...

Grubhub says hack on third-party exposed information on campus customers

February 8, 2025/

The delivery service Grubhub said a hacker stole personal data and partial payment card information from customers through a third-party contractor. In a statement published on Monday evening, the company said it recently identified a security incident that “originated with an account belonging to a third-party service provider that provided support services to...

US Treasury says Chinese hackers stole documents in ‘major incident’

December 31, 2024/

WASHINGTON (Reuters) -Chinese state-sponsored hackers breached the U.S. Treasury Department’s computer security guardrails this month and stole documents in what Treasury called a “major incident,” according to a letter to lawmakers that Treasury officials provided to Reuters on Monday. The hackers compromised third-party cybersecurity service provider BeyondTrust and were able to access unclassified...

How to tell if a USB cable is hiding malicious hacker hardware

December 21, 2024/

Are your USB cables sending your data to hackers? We expect USB-C cables to perform a specific task: transferring either data or files between devices. We give little more thought to the matter, but malicious USB-C cables can do much more than what we expect. These cables hide malicious hardware that can intercept...

New LightSpy Spyware Version Targets iPhones with Increased Surveillance Tactics

November 26, 2024/

Cybersecurity researchers have discovered an improved version of an Apple iOS spyware called LightSpy that not only expands on its functionality, but also incorporates destructive capabilities to prevent the compromised device from booting up. “While the iOS implant delivery method closely mirrors that of the macOS version, the post-exploitation and privilege escalation stages...

See More

End of Content.

Company

Cyber Training Group International (CTGI) is a Cyber Security Training Institute That Empowers Clients. Your one-stop online platform for all your cyber security awareness and training.

Most Recent Posts

Join Our Webinar

We schedule regular webinars across different geographies and time zones.

Our vision is to create and deliver Cyber Security Awareness training to the NGOs, Small Medium Businesses, and Enterprises to help them reduce exposure to cyber security attacks.

Copyright © 2024 Cyber Training Group International | All Rights Reserved