Skip to content
Technology Security Information
  • Home
  • News
  • Security
  • Cyber Security
  • Threats

A New Age of Hacktivism

Posted on February 23, 2024
In the past 2 years, we have observed a significant surge in hacktivism activity due to ongoing wars and geopolitical conflicts in various regions. Since the war against Ukraine began, we have witnessed a notable mobilization of non-state and state-backed actors alike, forming new groups or joining existing hacker collectives. 
We understand hacktivism as a form of computer hacking that is
Posted in News

Post navigation

Previous: Russian Government Software Backdoored to Deploy Konni RAT Malware
Next: US State Department Offers Up to $15 Million for Information on ALPHV/Blackcat Ransomware Gang

Recent Posts

  • ‘The Batman Part II’ May Be Adding a New Member of the Bat-Family
  • Attackers Target the Foundations of Crypto: Smart Contracts
  • The First Xbox Handheld Could Be Coming Sooner Than You Think
  • Turn your AirPods Max into a masterpiece with Casetify’s new headphone wrap
  • What is Laura Loomer?

Recent Comments

No comments to show.

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023

Categories

  • Cyber Security
  • News
  • Security
  • Threats
  • Uncategorized

Related Posts

Everything We Know About Anne Rice’s Immortal Universe

  • News

AMC has bought the rights to 14 of Anne Rice’s…

  • rooter
  • March 15, 2023
  • 1 min read
  • 0

A Comprehensive Guide to Finding Service Accounts in Active Directory

  • News

Service accounts are vital in any enterprise, running automated processes…

  • rooter
  • October 22, 2024
  • 1 min read
  • 0

China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

  • News

The China-linked threat actor behind the recent in-the-wild exploitation of…

  • rooter
  • May 30, 2025
  • 1 min read
  • 0

NIST’s Vuln Database Downshifts, Prompting Questions About Its Future

  • News

NVD may be in peril, and while alternatives exist, enterprise…

  • rooter
  • March 28, 2024
  • 1 min read
  • 0
Copyright © 2025 Technology Security Information Theme: Translucent Blog By Adore Themes.