Google Password Leak? What Really Happened and Why It Matters for Your Security

By Pranshu Amin If you are like me and spend a good chunk of time online you must have come across some headlines claiming Google’s passwords were leaked in June 2025 [1] (Cybernews, 2025), sparking concerns for millions of users. But what does this really mean? Was google really hacked or is there more to …

Inside the Jaguar Land Rover Cyberattack

Jaguar Land Rover (JLR) isn’t just England’s largest carmaker, it’s an icon. From luxury SUVs to rugged Defenders, its vehicles are part of a global story. Behind that story is a workforce of approximately 33,000 people (an additional 100,000 jobs across its supply chain), a far-flung supply chain, and a digital nervous system that ties …

PBKDF2 – History, Usage, and Future – Teaching Aide

GitHub link to the website code: https://github.com/Benedict-Kpaduwa/PBKDF2-Project/ Storing and transmitting information securely, as well as ensuring its integrity, authenticity, and confidentiality are some of the most important problems faced within a field of cryptography. There are all kinds of encrypting, hashing and signing algorithms, all relying on some secret password. One of the biggest problems …

Confederation of the UNCs – A Brief Look into A Series of the Salesforce Data Theft Exploit

CAUTION: This post is most-likely riddled with a prematurely conceived notion of someone who thinks they can fix cybersecurity for the defenders (we have a lot of those, don’t we?), but hear me out and approach this from the point of view of someone who genuinely wants to work with another person (and another person, …

SlopAds Campaign – 224 Malicious Apps Found in Google Play Store

What Happened? Security researchers from HUMAN’s Satori Threat Intelligence team were able to discover a massive ad fraud campaign that was being distributes through over 200 mobile apps available in Google Play Store. They named the whole campaign “SlopAds”, to signify the mass-production of malicious apps and the use of generative AI throughout the campaign. …

SharePoint Critical Zero-Day Vulnerability

Your university and your business operations could face serious risks. The Microsoft SharePoint zero-day attack affected many institutions this past summer. Microsoft is urging administrators to take action and use the latest security updates. This exploit is being used in mass attacks. At least 400 organizations have been confirmed to have been breached. The Washington …

The Fortinet Data Breach: A Deep Dive into the Recent Cybersecurity Incident

Cybersecurity breaches are becoming increasingly common in a world where there is a significant increase in digital infrastructure. Fortinet, a key player that provides cybersecurity solutions, recently faced a security breach. This breach, which took place over a few months, has gained significant attention in the cybersecurity community. What Happened? Early in September 2024, Fortinet …

Understanding Cryptographic Attacks: Working, Prevention, Real-World Impacts, Strongest and Weakest Algorithm to Specific Attack – Teaching Aide

Meet our Team members: An Introduction to our Project : In today’s digital age, cryptography plays a vital role in securing communication, protecting sensitive data, and ensuring the integrity of information. However, as cryptographic techniques evolve, so too do the methods used by attackers to undermine them. This Teaching Aide will help you to understand …

What is Spyware? Definition, types, how to find and remove spyware from your phone

“Trust not the horse, O Trojans. Be it what it may, I fear the Greeks when they offer gifts” _Virgil. Many of us have heard about the Greek mythology “Trojan horse” where a wooden horse was made for hiding soldier to enter the city of troy during war. No one thought that this small gesture …

Magento and Adobe Commerce Stores Are Victims of the CosmicSting Attack.

Introduction Cybersecurity researchers have discovered evidence of a large-scale attack targeting Adobe Commerce and Magento online retailers. Roughly 5% of these online marketplaces have been compromised by the so-called “CosmicSting” security holes. With a CVSS [Common Vulnerability Scoring System (CVSS) ] severity rating of 9.8, CVE-2024-34102 is one of the most serious vulnerabilities that have …