thecyberexpress.com Open in urlscan Pro
2606:4700:20::ac43:4930  Public Scan

Submitted URL: https://thecyberexpress.com/cyberattack-on-columbia-university/amp
Effective URL: https://thecyberexpress.com/cyberattack-on-columbia-university/
Submission: On November 28 via api from RU — Scanned from DE

Form analysis 8 forms found in the DOM

GET https://thecyberexpress.com/

<form action="https://thecyberexpress.com/" method="get" class="jeg_search_form" target="_top">
  <input name="s" class="jeg_search_input" placeholder="Search..." type="text" value="" autocomplete="off">
  <button aria-label="Search Button" type="submit" class="jeg_search_button btn"><i class="fa fa-search"></i></button>
</form>

GET https://thecyberexpress.com/

<form action="https://thecyberexpress.com/" method="get" class="jeg_search_form" target="_top">
  <input name="s" class="jeg_search_input" placeholder="Search..." type="text" value="" autocomplete="off">
  <button aria-label="Search Button" type="submit" class="jeg_search_button btn"><i class="fa fa-search"></i></button>
</form>

GET https://thecyberexpress.com/

<form action="https://thecyberexpress.com/" method="get" class="jeg_search_form" target="_top">
  <input name="s" class="jeg_search_input" placeholder="Search..." type="text" value="" autocomplete="off">
  <button aria-label="Search Button" type="submit" class="jeg_search_button btn"><i class="fa fa-search"></i></button>
</form>

GET https://thecyberexpress.com

<form action="https://thecyberexpress.com" method="get"><label class="screen-reader-text" for="cat">Categories</label><select name="cat" id="cat" class="postform">
    <option value="-1">Select Category</option>
    <option class="level-0" value="54">Appointments</option>
    <option class="level-0" value="55">Budgets</option>
    <option class="level-0" value="680">Bug Bounty &amp; Rewards</option>
    <option class="level-0" value="50">Business News</option>
    <option class="level-0" value="44">Compliance</option>
    <option class="level-0" value="42">Cyber Essentials</option>
    <option class="level-0" value="1">Cyber News</option>
    <option class="level-0" value="48">Cyber Warfare</option>
    <option class="level-0" value="5677">Cybersecurity Awareness Month</option>
    <option class="level-0" value="3089">Dark Web News</option>
    <option class="level-0" value="41">Data Breach News</option>
    <option class="level-0" value="3104">DDoS Attacks News</option>
    <option class="level-0" value="6225">Deepfake</option>
    <option class="level-0" value="49">Espionage</option>
    <option class="level-0" value="47">Features</option>
    <option class="level-0" value="39">Firewall Daily</option>
    <option class="level-0" value="1599">Gitex2022</option>
    <option class="level-0" value="45">Governance</option>
    <option class="level-0" value="4159">Hacker Claims</option>
    <option class="level-0" value="40">Hacker News</option>
    <option class="level-0" value="7751">Hackers Interview</option>
    <option class="level-0" value="2026">How to</option>
    <option class="level-0" value="62">Interviews</option>
    <option class="level-0" value="8932">Knowledge Hub</option>
    <option class="level-0" value="57">Learning &amp; Development</option>
    <option class="level-0" value="3953">Lockbit Ransomware News</option>
    <option class="level-0" value="265">Main Story</option>
    <option class="level-0" value="3077">Malware News</option>
    <option class="level-0" value="61">Market Reports</option>
    <option class="level-0" value="52">Mergers &amp; Aquisitions</option>
    <option class="level-0" value="53">Partnerships</option>
    <option class="level-0" value="63">Podcast</option>
    <option class="level-0" value="46">Policy Updates</option>
    <option class="level-0" value="1087">Press Release</option>
    <option class="level-0" value="71">Ransomware News</option>
    <option class="level-0" value="43">Regulations</option>
    <option class="level-0" value="58">Research</option>
    <option class="level-0" value="3094">Resources</option>
    <option class="level-0" value="60">Sponsored Content</option>
    <option class="level-0" value="51">Startups</option>
    <option class="level-0" value="8381">Threat Actors</option>
    <option class="level-0" value="4388">Threat Intelligence</option>
    <option class="level-0" value="4376">Threat Intelligence News</option>
    <option class="level-0" value="70">Vulnerabilities</option>
    <option class="level-0" value="3079">Vulnerability News</option>
    <option class="level-0" value="7637">What is</option>
    <option class="level-0" value="59">Whitepapers</option>
    <option class="level-0" value="56">Workforce</option>
  </select>
</form>

POST #

<form action="#" data-type="login" method="post" accept-charset="utf-8">
  <h3>Welcome Back!</h3>
  <p>Login to your account below</p>
  <!-- Form Messages -->
  <div class="form-message"></div>
  <p class="input_field">
    <input type="text" name="username" placeholder="Username" value="">
  </p>
  <p class="input_field">
    <input type="password" name="password" placeholder="Password" value="">
  </p>
  <p class="input_field remember_me">
    <input type="checkbox" id="remember_me" name="remember_me" value="true">
    <label for="remember_me">Remember Me</label>
  </p>
  <p class="submit">
    <input type="hidden" name="action" value="login_handler">
    <input type="hidden" name="jnews_nonce" value="25d163c004">
    <input type="submit" name="jeg_login_button" class="button" value="Log In" data-process="Processing . . ." data-string="Log In">
  </p>
  <div class="bottom_links clearfix">
    <a href="#jeg_forgotform" class="jeg_popuplink forgot">Forgotten Password?</a>
  </div>
</form>

POST #

<form action="#" data-type="forgot" method="post" accept-charset="utf-8">
  <h3>Retrieve your password</h3>
  <p>Please enter your username or email address to reset your password.</p>
  <!-- Form Messages -->
  <div class="form-message"></div>
  <p class="input_field">
    <input type="text" name="user_login" placeholder="Your email or username" value="">
  </p>
  <div class="g-recaptcha" data-sitekey=""></div>
  <p class="submit">
    <input type="hidden" name="action" value="forget_password_handler">
    <input type="hidden" name="jnews_nonce" value="25d163c004">
    <input type="submit" name="jeg_login_button" class="button" value="Reset Password" data-process="Processing . . ." data-string="Reset Password">
  </p>
  <div class="bottom_links clearfix">
    <a href="#jeg_loginform" class="jeg_popuplink"><i class="fa fa-lock"></i> Log In</a>
  </div>
</form>

POST #

<form action="#" method="post" accept-charset="utf-8">
  <h3>Add New Playlist</h3>
  <!-- Form Messages -->
  <div class="form-message"></div>
  <div class="form-group">
    <p class="input_field">
      <input type="text" name="title" placeholder="Playlist Name" value="">
    </p>
    <p class="input_field">
      <select name="visibility">
        <option disabled="" selected="selected" value="">- Select Visibility -</option>
        <option value="public">Public</option>
        <option value="private">Private</option>
      </select>
    </p>
    <!-- submit button -->
    <div class="submit">
      <input type="hidden" name="type" value="create_playlist">
      <input type="hidden" name="action" value="playlist_handler">
      <input type="hidden" name="post_id" value="">
      <input type="hidden" name="jnews-playlist-nonce" value="a2bffa8989">
      <input type="submit" name="jeg_save_button" class="button" value="Save" data-process="Processing . . ." data-string="Save">
    </div>
  </div>
</form>

GET https://thecyberexpress.com/

<form action="https://thecyberexpress.com/" method="get" class="jeg_search_form" target="_top">
  <input name="s" class="jeg_search_input" placeholder="Search..." type="text" value="" autocomplete="off">
  <button aria-label="Search Button" type="submit" class="jeg_search_button btn"><i class="fa fa-search"></i></button>
</form>

Text Content

#1 TRENDING CYBERSECURITY NEWS & MAGAZINE


We are Hiring!
Thursday, November 28, 2024

No Result
View All Result
Free Newsletter

 * MagazineDownload
 * Firewall Daily
    * All
    * Bug Bounty & Rewards
    * Dark Web News
    * Data Breach News
    * Hacker News
    * Ransomware News
    * Vulnerabilities
   
   
   VERIZON, AT&T TARGETED BY SECOND THREAT ACTOR WHO CLAIMS TRUMP, HARRIS CALL
   LOGS
   
   
   HACKERS EXPLOIT FIREFOX AND WINDOWS FLAWS: ROMCOM’S ADVANCED ATTACK UNVEILED
   
   
   AI RED TEAMING IN FOCUS: WHY CISA ADVOCATES A SECURE BY DESIGN APPROACH
   
   
   MAJOR CYBERCRIME OPERATION NETS OVER 1,000 ARRESTS ACROSS AFRICA
   
   
   CISA ADDS ARRAY NETWORKS’ CVE-2023-28461 TO KEV LIST: CRITICAL PATCHING URGED
   
   
   URSNIF TROJAN CAMPAIGN TARGETS U.S. PROFESSIONALS VIA STEALTHY SPAM ATTACKS
   
   
   CHINA ATTACK ON U.S. TELECOM NETWORKS: ‘THOUSANDS AND THOUSANDS’ OF DEVICES
   NEED TO BE REPLACED
   
   
   CAN AI SAVE THE UK FROM A CYBER CATASTROPHE? THE FIGHT AGAINST RUSSIAN
   HACKERS
   
   
   AI IN CYBERSECURITY MARKET SET FOR EXPLOSIVE GROWTH, PROJECTED TO REACH
   $154.8 BILLION BY 2032
   
   
   
   
   TRENDING TAGS
   
    * blackbyte ransomware
    * Ransomware
    * lapsus$ ransomware
    * Apple
    * Apple vulnerability

 * Essentials
    * All
    * Compliance
    * Governance
    * Policy Updates
    * Regulations
   
   
   AI RED TEAMING IN FOCUS: WHY CISA ADVOCATES A SECURE BY DESIGN APPROACH
   
   
   MAJOR CYBERCRIME OPERATION NETS OVER 1,000 ARRESTS ACROSS AFRICA
   
   
   USDA’S FIDO ROLLOUT: A CASE STUDY IN PHISHING-RESISTANT MFA
   
   
   DISTRIBUTOR OF ANOM ENCRYPTED DEVICES SENTENCED TO OVER 5 YEARS IN PRISON
   
   
   U.S. EXTRADITES AND CHARGES ALLEGED PHOBOS RANSOMWARE ADMIN
   
   
   EUROPEAN CLUB AND MEDIA GIANT ABANDON X AMID GROWING HATE SPEECH CONCERNS
   
   
   GAO FINDS PERSISTENT GAPS IN HHS CYBERSECURITY EFFORTS IN U.S. HEALTHCARE
   
   
   WHY SEBI’S NEW GUIDELINES MAKE CYBER THREAT INTELLIGENCE ESSENTIAL FOR
   SECURITY TEAMS
   
   
   BUILDING A RESILIENT FUTURE: CISA KICKS OFF CRITICAL INFRASTRUCTURE SECURITY
   MONTH
   
   
   * Regulations
   * Compliance
   * Governance
   * Policy Updates
 * Knowledge Hub
    * All
    * How to
    * What is
   
   
   SHIELD YOUR ORGANIZATION: CEO’S PERSPECTIVE ON TAKE-DOWN SERVICES
   
   
   MICROSOFT ANNOUNCES MANDATORY MFA FOR AZURE SIGN-INS TO BOLSTER CLOUD
   DEFENSES
   
   
   HOW TO SET UP SIGNAL PROXY TO HELP BYPASS CENSORSHIP IN RUSSIA AND VENEZUELA
   
   
   WHY HEALTHCARE CISOS MUST PRIORITIZE THIRD-PARTY RISK MANAGEMENT
   
   
   PROTECT YOUR STREAMING ACCOUNTS NOW BEFORE IT’S TOO LATE
   
   
   KNOWBE4 UNCOVERS FAKE EMPLOYEE: HOW A NORTH KOREAN HACKER WAS HIRED INTO THE
   TEAM
   
   
   PROTECTING TELECOM NETWORKS: CTO STRATEGIES FOR DARK WEB THREATS
   
   
   HOW TO FIX THE WINDOWS ‘BLUE SCREEN OF DEATH’ ISSUE CAUSED BY CROWDSTRIKE
   
   
   PROACTIVE CYBER DEFENSE: THE ROLE OF DARK WEB MONITORING FOR CEOS IN BANKING
   
   
 * Features
   * Cyber Warfare
   * Espionage
   * Workforce
     * Learning & Development
 * Business
    * All
    * Appointments
    * Budgets
    * Mergers & Aquisitions
    * Partnerships
    * Press Release
    * Startups
   
   
   CAN AI SAVE THE UK FROM A CYBER CATASTROPHE? THE FIGHT AGAINST RUSSIAN
   HACKERS
   
   
   AI IN CYBERSECURITY MARKET SET FOR EXPLOSIVE GROWTH, PROJECTED TO REACH
   $154.8 BILLION BY 2032
   
   
   EY IDENTITY ACQUIRES J GROUP CONSULTING TO STRENGTHEN PRIVILEGED ACCESS
   MANAGEMENT
   
   
   NORTH KOREA’S CYBER EVOLUTION AND CHINA’S STORM-2077 UNVEILED BY MICROSOFT
   ANALYSTS
   
   
   DOJ ORDERS GOOGLE TO SELL CHROME TO END SEARCH MONOPOLY: A POSSIBLE
   GAME-CHANGER FOR COMPETITION
   
   
   MAJOR CYBERATTACK TARGETS GAMBLING GIANT IGT, SYSTEMS TAKEN OFFLINE
   
   
   CERT-IN FLAGS CRITICAL VULNERABILITIES IN ZOOM: UPDATE YOUR APPS NOW
   
   
   DOJ TAKES DOWN GLOBAL CYBERCRIME HUB POPEYETOOLS, SEIZES CRYPTOCURRENCY
   
   
   AI AND OPEN SOURCE SECURITY: THE CRITICAL ROLE OF AI-POWERED FUZZING IN
   FINDING FLAWS
   
   
   * Startups
   * Mergers & Aquisitions
   * Partnerships
   * Appointments
   * Budgets
   * Research
     * Whitepapers
     * Sponsored Content
     * Market Reports
   * Interviews
     * Podcast
 * Events
   * Conference
   * Webinar
   * Endorsed Events
 * Advisory Board


 * MagazineDownload
 * Firewall Daily
    * All
    * Bug Bounty & Rewards
    * Dark Web News
    * Data Breach News
    * Hacker News
    * Ransomware News
    * Vulnerabilities
   
   
   VERIZON, AT&T TARGETED BY SECOND THREAT ACTOR WHO CLAIMS TRUMP, HARRIS CALL
   LOGS
   
   
   HACKERS EXPLOIT FIREFOX AND WINDOWS FLAWS: ROMCOM’S ADVANCED ATTACK UNVEILED
   
   
   AI RED TEAMING IN FOCUS: WHY CISA ADVOCATES A SECURE BY DESIGN APPROACH
   
   
   MAJOR CYBERCRIME OPERATION NETS OVER 1,000 ARRESTS ACROSS AFRICA
   
   
   CISA ADDS ARRAY NETWORKS’ CVE-2023-28461 TO KEV LIST: CRITICAL PATCHING URGED
   
   
   URSNIF TROJAN CAMPAIGN TARGETS U.S. PROFESSIONALS VIA STEALTHY SPAM ATTACKS
   
   
   CHINA ATTACK ON U.S. TELECOM NETWORKS: ‘THOUSANDS AND THOUSANDS’ OF DEVICES
   NEED TO BE REPLACED
   
   
   CAN AI SAVE THE UK FROM A CYBER CATASTROPHE? THE FIGHT AGAINST RUSSIAN
   HACKERS
   
   
   AI IN CYBERSECURITY MARKET SET FOR EXPLOSIVE GROWTH, PROJECTED TO REACH
   $154.8 BILLION BY 2032
   
   
   
   
   TRENDING TAGS
   
    * blackbyte ransomware
    * Ransomware
    * lapsus$ ransomware
    * Apple
    * Apple vulnerability

 * Essentials
    * All
    * Compliance
    * Governance
    * Policy Updates
    * Regulations
   
   
   AI RED TEAMING IN FOCUS: WHY CISA ADVOCATES A SECURE BY DESIGN APPROACH
   
   
   MAJOR CYBERCRIME OPERATION NETS OVER 1,000 ARRESTS ACROSS AFRICA
   
   
   USDA’S FIDO ROLLOUT: A CASE STUDY IN PHISHING-RESISTANT MFA
   
   
   DISTRIBUTOR OF ANOM ENCRYPTED DEVICES SENTENCED TO OVER 5 YEARS IN PRISON
   
   
   U.S. EXTRADITES AND CHARGES ALLEGED PHOBOS RANSOMWARE ADMIN
   
   
   EUROPEAN CLUB AND MEDIA GIANT ABANDON X AMID GROWING HATE SPEECH CONCERNS
   
   
   GAO FINDS PERSISTENT GAPS IN HHS CYBERSECURITY EFFORTS IN U.S. HEALTHCARE
   
   
   WHY SEBI’S NEW GUIDELINES MAKE CYBER THREAT INTELLIGENCE ESSENTIAL FOR
   SECURITY TEAMS
   
   
   BUILDING A RESILIENT FUTURE: CISA KICKS OFF CRITICAL INFRASTRUCTURE SECURITY
   MONTH
   
   
   * Regulations
   * Compliance
   * Governance
   * Policy Updates
 * Knowledge Hub
    * All
    * How to
    * What is
   
   
   SHIELD YOUR ORGANIZATION: CEO’S PERSPECTIVE ON TAKE-DOWN SERVICES
   
   
   MICROSOFT ANNOUNCES MANDATORY MFA FOR AZURE SIGN-INS TO BOLSTER CLOUD
   DEFENSES
   
   
   HOW TO SET UP SIGNAL PROXY TO HELP BYPASS CENSORSHIP IN RUSSIA AND VENEZUELA
   
   
   WHY HEALTHCARE CISOS MUST PRIORITIZE THIRD-PARTY RISK MANAGEMENT
   
   
   PROTECT YOUR STREAMING ACCOUNTS NOW BEFORE IT’S TOO LATE
   
   
   KNOWBE4 UNCOVERS FAKE EMPLOYEE: HOW A NORTH KOREAN HACKER WAS HIRED INTO THE
   TEAM
   
   
   PROTECTING TELECOM NETWORKS: CTO STRATEGIES FOR DARK WEB THREATS
   
   
   HOW TO FIX THE WINDOWS ‘BLUE SCREEN OF DEATH’ ISSUE CAUSED BY CROWDSTRIKE
   
   
   PROACTIVE CYBER DEFENSE: THE ROLE OF DARK WEB MONITORING FOR CEOS IN BANKING
   
   
 * Features
   * Cyber Warfare
   * Espionage
   * Workforce
     * Learning & Development
 * Business
    * All
    * Appointments
    * Budgets
    * Mergers & Aquisitions
    * Partnerships
    * Press Release
    * Startups
   
   
   CAN AI SAVE THE UK FROM A CYBER CATASTROPHE? THE FIGHT AGAINST RUSSIAN
   HACKERS
   
   
   AI IN CYBERSECURITY MARKET SET FOR EXPLOSIVE GROWTH, PROJECTED TO REACH
   $154.8 BILLION BY 2032
   
   
   EY IDENTITY ACQUIRES J GROUP CONSULTING TO STRENGTHEN PRIVILEGED ACCESS
   MANAGEMENT
   
   
   NORTH KOREA’S CYBER EVOLUTION AND CHINA’S STORM-2077 UNVEILED BY MICROSOFT
   ANALYSTS
   
   
   DOJ ORDERS GOOGLE TO SELL CHROME TO END SEARCH MONOPOLY: A POSSIBLE
   GAME-CHANGER FOR COMPETITION
   
   
   MAJOR CYBERATTACK TARGETS GAMBLING GIANT IGT, SYSTEMS TAKEN OFFLINE
   
   
   CERT-IN FLAGS CRITICAL VULNERABILITIES IN ZOOM: UPDATE YOUR APPS NOW
   
   
   DOJ TAKES DOWN GLOBAL CYBERCRIME HUB POPEYETOOLS, SEIZES CRYPTOCURRENCY
   
   
   AI AND OPEN SOURCE SECURITY: THE CRITICAL ROLE OF AI-POWERED FUZZING IN
   FINDING FLAWS
   
   
   * Startups
   * Mergers & Aquisitions
   * Partnerships
   * Appointments
   * Budgets
   * Research
     * Whitepapers
     * Sponsored Content
     * Market Reports
   * Interviews
     * Podcast
 * Events
   * Conference
   * Webinar
   * Endorsed Events
 * Advisory Board

No Result
View All Result
No Result
View All Result


TRENDING
TARGETED INDUSTRIES -> IT & ITES | Technology | Government & LEA | Healthcare |
BFSITARGETED COUNTRIES -> United States | Russian Federation | China | United
Kingdom | GermanyTARGETED REGIONS -> North America (NA) | Europe & UK | Asia &
Pacific (APAC) | Middle East & Africa (MEA) | Australia and New Zealand
(ANZ)IOCs -> a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91 |
7bdbd180c081fa63ca94f9c22c457376 |
c67b03c0a91eaefffd2f2c79b5c26a2648b8d3c19a22cadf35453455ff08ead0 |
8c69830a50fb85d8a794fa46643493b2 | bbcf7a68f4164a9f5f5cb2d9f30d9790CVEs ->
CVE-2024-21887 | CVE-2023-46805 | CVE-2017-11882 | CVE-2024-21893 |
CVE-2021-44228TECHNIQUES -> T1082 | T1140 | T1486 | T1083 | T1105TACTICS ->
TA505 | TA0011 | TA0002 | TA0001 | TA0005TAGS -> security | the-cyber-express |
firewall-daily | the-cyber-express-news | malwareTHREAT ACTORS -> Lockbit |
Blackcat | Lazarus | VoltTyphoon | KimsukyMALWARE -> CobaltStrike | Qakbot |
Xmrig | Icedid | TrickbotSOURCES -> Darkreading | The Cyber Express |
Bleepingcomputer | The Hacker News | Infosecurity Magazine

  

Home » Firewall Daily » Hacktivists Claim Cyberattack on Columbia University
After Police Crackdown on Protests


HACKTIVISTS CLAIM CYBERATTACK ON COLUMBIA UNIVERSITY AFTER POLICE CRACKDOWN ON
PROTESTS

by Samiksha Jain
May 2, 2024
Reading Time: 4 mins read

Share on LinkedInShare on Twitter



Anonymous Arabia, a notorious group of hacktivists, has allegedly launched a
cyberattack on Columbia University in response to the recent police crackdown on
its students. The Columbia University cyberattack, purportedly initiated as
retaliation for the police intervention, has sparked concerns and debates over
the appropriate response to protests and the use of digital warfare.

The group, known for its activities in the dark corners of the internet, posted
a message with the tagline “HUGE USA UNIVERSITY CYBERATTACK” on a dark web
forum.


THE ALLEGED CYBERATTACK ON COLUMBIA UNIVERSITY

The message boldly declares, “We have now started an unprecedented cyberattack
on the University of Columbia in the US in retaliation to the police raid on the
student occupation of the university building. We took down the whole network of
Columbia and most of the University websites and Eservices (including Email
servers).


Source: X

This cyberattack comes in the wake of a recent incident where police forces
intervened to dismantle protests staged by students who were occupying
university premises as a form of demonstration.


CAMPUS TENSIONS: BACKGROUND AND RESPONSE

The incident at Columbia University involved a group of protesters breaking into
Hamilton Hall, barricading themselves inside, and occupying it throughout the
day. The escalation prompted the university administration to call for police
assistance, leading to the removal of the protesters.

Minouche Shafik, President of Columbia University in the City of New York,
expressed deep sadness over the events, stating that the university had been
patient in tolerating unauthorized demonstrations for several months. Efforts
were made to engage in dialogue with the protesters, including considerations
for their demands, but a resolution could not be reached.

Your browser does not support the video tag.

Our efforts to find a solution went into Tuesday evening, but regrettably, we
were unable to come to resolution. Because my first responsibility is safety,
with the support of the University’s Trustees, I made the decision to ask the
New York City Police Department to intervene to end the occupation of Hamilton
Hall and dismantle the main encampment along with a new, smaller encampment,”
said Shafik.

Shafik emphasized the university’s commitment to free speech and activism but
condemned the acts of violence and destruction carried out during the protests.
The decision to involve law enforcement was made to ensure the safety of the
campus community and to restore order.

The aftermath of the police intervention has seen a wave of arrests and clashes
on various university campuses across the United States. New York City Mayor
Eric Adams reported 300 arrests at Columbia University and the City College of
New York. Similar incidents occurred at the University of Texas at Dallas and
Fordham University, among others.

Former President Donald Trump, during a campaign rally in Wisconsin, applauded
the police action at Columbia University, describing it as “a beautiful thing to
watch.” However, the response to the protests has not been without criticism.
California Governor Gavin Newsom’s office labeled the law enforcement response
at the University of California, Los Angeles (UCLA), as “limited and delayed,”
with clashes between rival protesters resulting in numerous injuries.


ALLEGED COLUMBIA UNIVERSITY CYBERATTACK: UNCERTAINTY AND VERIFICATION

Amidst the chaos, the alleged cyberattack on Columbia University by Anonymous
Arabia has raised further concerns. However, upon accessing the university’s
official website, no evidence of foul play was detected. The Cyber Express Team
reached out to Columbia University for verification, but as of writing this
report, no response has been received, leaving the claim unverified.

Whether this cyberattack is a genuine act of hacktivism or a tactic to gain
attention remains uncertain. Only an official statement from Columbia University
can confirm the legitimacy of the claim. Meanwhile, the incident highlights the
growing intersection between digital warfare and real-world activism,
highlighting the complex dynamics of modern protests and their consequences.

Media Disclaimer: This report is based on internal and external research
obtained through various means. The information provided is for reference
purposes only, and users bear full responsibility for their reliance on it. The
Cyber Express assumes no liability for the accuracy or consequences of using
this information.


SHARE THIS:

 * Click to share on LinkedIn (Opens in new window)
 * Click to share on Reddit (Opens in new window)
 * Click to share on Twitter (Opens in new window)
 * Click to share on Facebook (Opens in new window)
 * More
 * 

 * Click to email a link to a friend (Opens in new window)
 * Click to share on WhatsApp (Opens in new window)
 * 


RELATED










SAMIKSHA JAIN

Samiksha Jain is a seasoned journalist with 9 years of experience, passionately
unraveling the intricate world of cybersecurity for The Cyber Express. Her
expertise shines through in her compelling articles on data breaches and
cyberattacks. When she's not writing, you can find Samiksha exploring new
destinations or enjoying playful moments with her 2-year-old. Balancing the
demands of journalism and motherhood, she embodies a dynamic blend of curiosity
and care.



Next Post


CL0P LISTS MCKINLEY PACKING, PILOT, AND PINNACLE ENGINEERING AS LATEST VICTIMS


Your browser does not support the video tag.


Follow Us On Google News




LATEST ISSUE IS OUT. SUBSCRIBE NOW




LATEST CYBER NEWS

Cyber News


VERIZON, AT&T TARGETED BY SECOND THREAT ACTOR WHO CLAIMS TRUMP, HARRIS CALL LOGS

November 27, 2024
Firewall Daily


HACKERS EXPLOIT FIREFOX AND WINDOWS FLAWS: ROMCOM’S ADVANCED ATTACK UNVEILED

November 27, 2024
Cyber Essentials


AI RED TEAMING IN FOCUS: WHY CISA ADVOCATES A SECURE BY DESIGN APPROACH

November 27, 2024
Cyber News


MAJOR CYBERCRIME OPERATION NETS OVER 1,000 ARRESTS ACROSS AFRICA

November 26, 2024




CATEGORIES

Categories Select Category Appointments Budgets Bug Bounty & Rewards Business
News Compliance Cyber Essentials Cyber News Cyber Warfare Cybersecurity
Awareness Month Dark Web News Data Breach News DDoS Attacks News Deepfake
Espionage Features Firewall Daily Gitex2022 Governance Hacker Claims Hacker News
Hackers Interview How to Interviews Knowledge Hub Learning & Development Lockbit
Ransomware News Main Story Malware News Market Reports Mergers & Aquisitions
Partnerships Podcast Policy Updates Press Release Ransomware News Regulations
Research Resources Sponsored Content Startups Threat Actors Threat Intelligence
Threat Intelligence News Vulnerabilities Vulnerability News What is Whitepapers
Workforce


WEB STORIES

Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information




            
      
            
                  


SUBSCRIBE TO DAILY NEWS

Stay ahead of the curve with The Cyber Express’s Daily News! Our newsletter
delivers the latest cybersecurity headlines, expert insights, and critical
updates straight to your inbox every morning. From breaking news and in-depth
analysis to emerging threats and industry trends, our curated content ensures
you’re always informed and prepared.

            
            
                               
      


Facebook Twitter LinkedIn


ABOUT


THE CYBER EXPRESS

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that
provides information security professionals with the latest news, updates and
knowledge they need to combat cyber threats.

 


CONTACT

For editorial queries: editor@thecyberexpress.com

For marketing and Sales: raj@thecyberexpress.com

For Events & Conferences related information: ashish.j@thecyberexpress.com

 


QUICK LINKS

 * About Us
 * Contact Us
 * Editorial Calendar
 * Careers
 * The Cyber Express by Cyble Vulnerability Disclosure Policy
 * Cyble Trust Portal


OUR ADDRESS

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon
East, Mumbai, Maharashtra, India – 4000063



© 2022 - 2024 The Cyber Express by Cyble. All Rights Reserved




WELCOME BACK!

Login to your account below







Remember Me



Forgotten Password?


RETRIEVE YOUR PASSWORD

Please enter your username or email address to reset your password.









Log In


ADD NEW PLAYLIST



- Select Visibility -PublicPrivate





No Result
View All Result
 * Magazine
 * Firewall Daily
 * Essentials
   * Regulations
   * Compliance
   * Governance
   * Policy Updates
 * Knowledge Hub
 * Features
   * Cyber Warfare
   * Espionage
   * Workforce
     * Learning & Development
 * Business
   * Startups
   * Mergers & Aquisitions
   * Partnerships
   * Appointments
   * Budgets
   * Research
     * Whitepapers
     * Sponsored Content
     * Market Reports
   * Interviews
     * Podcast
 * Events
   * Conference
   * Webinar
   * Endorsed Events
 * Advisory Board

© 2022 - 2024 The Cyber Express by Cyble. All Rights Reserved



ARE YOU SURE WANT TO UNLOCK THIS POST?

Unlock left : 0 Yes No

ARE YOU SURE WANT TO CANCEL SUBSCRIPTION?

Yes No
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS
18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under
Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information