• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    EU AI Act

    Europe Moves to Ban AI Nudification Tools Under Updated AI Act

    ICE cyberattack

    China Demands Proof After Costa Rica Blames UNC2814 for ICE Cyberattack

    ATM Jackpotting Case

    ATM Jackpotting Suspect Added to FBI’s Ten Most Wanted List

    The Cyber Express Weekly Roundup

    The Cyber Express Weekly Roundup: Global Cyberattacks, Espionage, Malware, and Critical Security Updates

    Veeam security patch

    Veeam Fixes RCE Bugs in Critical Backup & Replication Platform

    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    Slopoly

    Hive0163 Ransomware Operators Use AI-Generated Slopoly Malware

    cyber warfare 2026

    The State of Cyber Warfare in 2026: Nation-State Attacks, AI Weapons, and the New Digital Battlefield

    Handala, Stryker Cyberattack, Iran Israel War

    Who Is Handala — The Iran-Linked Ghost Group That Just Wiped 200K Stryker Devices

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    AI child safety in India

    India Outlines Legal Framework to Protect Children from AI and Online Harm

    Russia and China Cyberespionage

    Finland Warns Russia and China Cyber Espionage Ops Targeting Tech Sector

    Planning and Zoning Permit Phishing Scam

    FBI Flags Phishing Campaign Collecting Planning and Zoning Permit Payments

    op 50 Women in Cybersecurity to Watch in 2026

    Top 50 Women Leaders in Cybersecurity to Watch in 2026

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Stolen Credit Card Data Trafficking

    Chilean National Extradited to U.S. Over Stolen Credit Card Data Trafficking Scheme

    cybersecurity firewall

    Vietnam Announces National Cybersecurity Firewall Plan Under New Digital Governance Law

    government cyber security

    UK Tightens Government Cyber Security After Cutting Critical Vulnerabilities by 75%

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    EU AI Act

    Europe Moves to Ban AI Nudification Tools Under Updated AI Act

    ICE cyberattack

    China Demands Proof After Costa Rica Blames UNC2814 for ICE Cyberattack

    ATM Jackpotting Case

    ATM Jackpotting Suspect Added to FBI’s Ten Most Wanted List

    The Cyber Express Weekly Roundup

    The Cyber Express Weekly Roundup: Global Cyberattacks, Espionage, Malware, and Critical Security Updates

    Veeam security patch

    Veeam Fixes RCE Bugs in Critical Backup & Replication Platform

    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    Slopoly

    Hive0163 Ransomware Operators Use AI-Generated Slopoly Malware

    cyber warfare 2026

    The State of Cyber Warfare in 2026: Nation-State Attacks, AI Weapons, and the New Digital Battlefield

    Handala, Stryker Cyberattack, Iran Israel War

    Who Is Handala — The Iran-Linked Ghost Group That Just Wiped 200K Stryker Devices

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    AI child safety in India

    India Outlines Legal Framework to Protect Children from AI and Online Harm

    Russia and China Cyberespionage

    Finland Warns Russia and China Cyber Espionage Ops Targeting Tech Sector

    Planning and Zoning Permit Phishing Scam

    FBI Flags Phishing Campaign Collecting Planning and Zoning Permit Payments

    op 50 Women in Cybersecurity to Watch in 2026

    Top 50 Women Leaders in Cybersecurity to Watch in 2026

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Stolen Credit Card Data Trafficking

    Chilean National Extradited to U.S. Over Stolen Credit Card Data Trafficking Scheme

    cybersecurity firewall

    Vietnam Announces National Cybersecurity Firewall Plan Under New Digital Governance Law

    government cyber security

    UK Tightens Government Cyber Security After Cutting Critical Vulnerabilities by 75%

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Firewall Daily

Anonymous Sudan’s Hacktivism: A Genuine Cause or Just a Facade?

After Anonymous Sudan publicly showed its support to the pro-Russian Killnet group, there was little confusion left about where its affinities lie.

Editorial by Editorial
July 22, 2023
in Firewall Daily
0
Anonymous Sudan's Hacktivism
650
SHARES
3.6k
VIEWS
Share on LinkedInShare on Twitter

In January 2023, a cybercriminal group identifying themselves as “Anonymous Sudan” emerged as hacktivists. Throughout their operations, including OpSweden and OpDenmark, they targeted specific countries with the motive to fight against individuals who showed disrespect towards the religion of Islam.

However, doubts have been raised regarding the authenticity of Anonymous Sudan as a genuine hacktivist group due to the contrasting operational methods of the hacker collective when compared to conventional hacktivist groups.

These speculations have stemmed from concerns about the significant expenses associated with their attacking infrastructure, the timing of their cyber attacks, and their alleged affiliation with Russia.

After launching nearly 24 DDoS attacks on Australian organizations, Anonymous Sudan is expected to launch more cyber attacks on the nation, according to researchers. The 24 DDoS attacks were launched between March and April 2023.

And more attacks are suspected in the following months.

Anonymous Sudan hacktivism or pro-Russian attacks?

Anonymous Sudan launched cyber attacks against universities, airports, and medical institutions in France in March 2023.

report-ad-banner

The hackers from the group attributed their cyber attacks to the perceived humiliation of Islam’s religious figures through the depiction of cartoons. Their actions included threatening and releasing data obtained from cyber attacks conducted on various nations, including those belonging to NATO.

Moreover, the hacktivist group launched the OpIsrael campaign in support of pro-Palestinian causes and as a way to show support for the Palestinians oppressed by Israeli troops. They have also claimed Distributed Denial of Service (DDoS) attacks on Microsoft, which the company confirmed affected its product Outlook.

One of the reasons behind the targeting of Microsoft was the meeting between the US Secretary of State, Antony Blinken, and Saudi Arabian officials, where discussions took place regarding the imposed sanctions on the Sudanese Armed Forces, among other factors.

OpAustralia and Anonymous Sudan hacktivism

Anonymous Sudan launched nearly 24 DDoS attacks between 24 March and 1 April on the aviation, healthcare, and education sectors. They called the campaign opAustralia, which was started on 17 March, targeting Australia.

Researchers suspect that the campaign was likely religiously motivated and has been conducted by a Pakistani hacktivist group.

Anonymous Sudan claimed to launch more attacks on Australia in retaliation to the clothing showcased at the Melbourne Fashion Festival, featuring the text ‘God walks with me’ written in Arabic.

Besides the cyber attacks by Anonymous Sudan, the incident had other hacktivist groups launch cyber attacks on nearly 80 Australian organizations, which may not have had anything to do with the fashion festival.

Anonymous Sudan’s hacktivism questioned by researchers

According to a blog by CyberCX on Anonymous Sudan’s authenticity, the following points were highlighted that questioned its true motives –

  1. Time of the cyber attacks by Anonymous Sudan

The hackers mostly operate between UTC 22:00 and UTC 06:00. And, over 80% of its cyber attack claims were made between UTC 06:00 and 18:00. The timings align with several East African nations and most of Sudan and Eastern Europe including Moscow.

  1. Cost of the paid infrastructure used by Anonymous Sudan for hacktivism

The proxies that Anonymous Sudan uses to hide its DDoS traffic from detection were likely via paid proxy services.

It did not reply as much on TOR for traffic dispersal with only 2% of its common infrastructure being composed of TOR exit nodes. Nearly 33% of the complete attack traffic volume was estimated to be from paid proxy networks.

For a nation that falls below the global average household income of US $460 per year, Anonymous Sudan claiming to be from Sudan and investing nearly AU $4000 per month makes it suspicious on the ground of its origin.

  1. Anonymous Sudan hacktivism aligned with Russian motives

Researchers argued that the motive behind the expensive DDoS attacks for a comparatively smaller impact on portals may not amount to a larger goal of the hacktivist.

Moreover, the group targets Western countries, which remains consistent with Russian warfare strategies targeting those aligning with pro-Ukrainian nations, further solidifying the researchers’ claim.

  1. Language used by Anonymous Sudan

Although the group claims to fight for religious reasons including defending the people of Sudan, the hackers started using the Arabic language only after their motives began raising questions.

Anonymous Sudan primarily utilizes Russian and English languages for their posts across various channels. Interestingly, they made their Arabic language post approximately a month after the establishment of these channels.

Researchers argue that the Anonymous Sudan hacktivism is instead a garb to increase the cost of cyber defense in Western countries and others.

They are a smaller group or just an individual who works for religiously motivated and financially motivated reasons.

They have also publicly shown their allegiance to the pro-Russian hackers of the Killnet group and have cross-posted on each other’s channels about their cyber attacks.

What researchers observed about the hacktivism of Anonymous Sudan

“Anonymous Sudan has no known overlap with the original members of the 2019 Anonymous Sudan operation, which was anti-Russia and pro-Ukraine,” researchers from CyberCX stated.

The report further stated that the well-known group Anonymous clarified that they are not aligned with Anonymous Sudan.

“CyberCX assesses that Anonymous Sudan is likely to be an individual or a small, coordinated group rather than a grassroots hacktivist organization,” the report added.

The operational methods of the hacktivist group were questioned as well, as they exhibited a level of coordination not commonly seen among issue-oriented hacktivists.

In contrast to other hacktivist groups, who engage in semi-public discussions online to determine their targets for assault, Anonymous Sudan operates differently. Instead, they publicly declare their next targets while simultaneously launching cyber attacks.

Connections of Anonymous Sudan with Russia

After Anonymous Sudan publicly showed its support to the pro-Russian Killnet group, there was little confusion left about where its affinities lie. They use each other’s Telegram channels which signifies the closeness of operations and trust between Anonymous Sudan and the Killnet group.

It was observed that with increased attacks on Ukraine in the hands of Russia ever since February 2022 led to the formation of several pro-Russia hacktivist personas. Some of the more active groups targeting Ukraine and its allies were found to be Killnet and Anonymous Russia.

“In June, Killnet-affiliated threat actors including Anonymous Sudan announced plans to launch non-DDoS attacks on Western financial institutions and the SWIFT network in conjunction with REvil,” according to the CyberCX report.

REvil, the Russia-based group, extorted money from its target, including the prominent data breach at Medibank. It is a coincidence that nearly when REvil’s darknet website went offline in the last few months, Anonymous Sudan gained traction for its activities. However, there has been no evidence to support claims of any connections between the two groups.

Russian intelligence and reports of cyber attacks

The CyberCX report maintained that the Russian intelligence was affiliated with pro-Russian hacktivist groups.

“We assess that it is highly likely that at least some members of the Killnet collective are linked to the Russian state,” the report further added. This brings a chance for Anonymous Sudan’s hackers to connect with Russia.

The cyber attack on a Canadian gas pipeline in April 2023 exposed sensitive US signals intelligence to pro-Russian hackers and a member of the Killnet group, Zarya. It was anticipated that an attack such as this would lead to an explosion.

Zarya was suspected to be on standby for instructions from the Federal Security Service (FSB) of the Russian Federation. The leaked briefing from the US classified data asserted that Zarya had controls to increase valve pressure, disable alarms, and start an emergency shutdown of the facility.

Addressing the authenticity of the claims of involvement of the FSB in the cyber attacks, a report read that the briefing showed signs of the hackers receiving instructions from someone presumed to be from the FSB.

The hackers claimed they had done enough damage to the Canadian, however, their intention was not to cause loss of life, only loss of income for Canadians,” according to a Zetter report.

It was concluded that Anonymous Sudan primarily targets Western organizations, specifically the government, media, and healthcare. Although the hackers from Anonymous Sudan claim that they are fighting for religious and Sudanese causes, they turn to seek monetary gains periodically.

Anonymous Sudan was formed three days before the Stockholm Quran burning incident, which led the group to cause cyber attacks in the region. It is suspected by researchers that Russian threat actors use hacktivists’ activities to strategically target European nations, among others.

They cause disinformation to polarize Western societies. Moreover, it was speculated that the Stockholm incident, which witnessed the burning of the Quran, was linked to a former contributor to the Kremlin-backed media outlet Russia Today.

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • More
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: Anonymous Sudan targetAnonymous Sudan tools costDDoShacktivismOpAustraliaThe Cyber ExpressThe Cyber Express News
Previous Post

Safeguarding the Digital Realm: An In-Depth Conversation with Erwin Eimers

Next Post

Tracking, Hacking and Attacking: The Game of Drones of Hovering Cybersecurity Risks

Next Post
Game of Drones

Tracking, Hacking and Attacking: The Game of Drones of Hovering Cybersecurity Risks

Threat Landscape Reports 2025

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

EU AI Act
Cyber News

Europe Moves to Ban AI Nudification Tools Under Updated AI Act

March 16, 2026
AI legal risks-Lisa Fitzgerald
Cyber News

AI Legal Risks: Lisa Fitzgerald on Why Businesses Must Vet AI Use Cases

March 16, 2026
ICE cyberattack
Firewall Daily

China Demands Proof After Costa Rica Blames UNC2814 for ICE Cyberattack

March 16, 2026
Diversity and inclusion
Cyber News

Women in Cybersecurity: One Step That Can Change the Industry

March 14, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information