- Mobile virtual network operator Mint Mobile discloses a data breach
-
Sketchy and Dangerous Android Children’s Tablets and TV Set-Top Boxes: 2023 in Review
-
Electronic Frontier Alliance Comes Back Strong: 2023 in Review
-
Hackers Stole $59 Million of Crypto Via Malicious Google and X Ads
-
Key findings from ESET Threat Report H2 2023 – Week in security with Tony Anscombe
-
No Code Application Development Platforms Set to Propel Your Business in 2024
-
Iranian cyberspies target US defense orgs with a brand new backdoor
-
Operation Haechi IV: Interpol Arrest 3,500, Seize Assets Worth $300M
-
1.5 Billion Real Estate Records Leaked, Including Elon Musk and Kylie Jenner
-
Sophisticated Web Injection Campaign Targets 50,000 Individuals, Pilfering Banking Data
-
Intellexa Spyware Adds Persistence with iOS or Android Device
-
Operation RusticWeb Using PowerShell Commands to Exfiltrate Confidential Documents
-
Akira ransomware gang claims the theft of sensitive data from Nissan Australia
-
Secure Password Hashing in Java: Best Practices and Code Examples
-
UAC-0099 Hackers Using Old WinRAR Flaw in New Cyberattack on Ukraine
-
The Effectiveness of AI is Limited in Cybersecurity, Yet Boundless in Cybercrime
-
UAC-0099UAC-0099 Hackers Using Old WinRAR Flaw in New Cyberattack on Ukraine
-
Update your Google Chrome browser ASAP to get these important new security features
-
Safeguard the joy: 10 tips for securing your shiny new device
-
Rogue WordPress Plugin Exposes E-Commerce Sites to Credit Card Theft
-
Multiple Vulnerabilities Found In Perforce Helix Core Server
-
AlphV/BlackCat allegedly calls for ransomware gang ‘cartel’ to stand up to police
-
India BSNL data breach exposes 2.9 million user records to hackers
-
Comcast’s Xfinity Breached: Data of 36 Million Users Exposed
-
Cyber sleuths reveal how they infiltrate the biggest ransomware gangs
-
Zoom says AI features should come at no additional cost. Here’s why
-
Rise in RaaS Operations and Implications for Business Security
-
International Bank Aims To Crack Down On Facebook Marketplace Scams
-
In Other News: Crypto Exchange Hack Guilty Plea, Rating AI Vulnerabilities, Intellexa Spyware
-
UK Teen Gets Indefinite Hospital Order For ‘Grand Theft Auto’ Hack
-
IBM’s 2024 predictions show gen AI is the new DNA of cyberattacks
-
Member of Lapsus$ gang sentenced to an indefinite hospital order
-
Best of 2023: Watching a Crypto Investment Scam WhatsApp Group
-
Codenotary Adds Machine Learning Algorithms to SBOM Search Tool
-
FBI Alarmed as Ransomware Strikes 300 Victims, Critical Sectors Under Siege
-
International Authorities Take Down ALPHV ransomware Gang’s Dark Web Leak Site
-
Operation RusticWeb: Rust-Based Malware Targets Indian Government Entities
-
Anticipating the Journey: Launching Your First Open Source Project
-
GigaOm’s Cloud Network Security Radar Ranks Check Point as the Industry Leader
-
Report Warns Of Landfill Risk, When Microsoft Ends Windows 10 Support
-
Iranian Hackers Targeting US Defense Industrial Base Entities With New Backdoor
-
Decoy Microsoft Word Documents Used to Deliver Nim-Based Malware
-
Congress Sure Made a Lot of Noise About Kids’ Privacy in 2023—and Not Much Else
-
These are the cybersecurity stories we were jealous of in 2023
-
Major Data Breach at ESO Solutions Affects 2.7 Million Patients
-
CISA Warns of FXC Router, QNAP NVR Vulnerabilities Exploited in the Wild
-
Inmate, Staff Information Stolen in Rhode Island Prison Data Breach
-
Malicious GPT Can Phish Credentials, Exfiltrate Them to External Server: Researcher
-
Ho Ho Home For Christmas? Tips For Avoiding Tech Terrors This Festive Season
-
Base Operations raises $9.1 million to boost global threat intelligence
-
JaskaGO Malware Attacking Windows and macOS Operating Systems
-
UAC-0099 Using WinRAR Exploit to Target Ukrainian Firms with LONEPAGE Malware
-
Hackers Exploiting Old Microsoft Office RCE Flaw to Deploy Agent Tesla Malware
-
Microsoft Warns of New ‘FalseFont’ Backdoor Targeting the Defense Sector
-
Companies Must Strengthen Cyber Defense in Face of Shifting Threat Actor Strategies
-
New insights into the global industrial cybersecurity landscape
-
Deepfactor 3.4 Includes Enhanced Runtime Reachability and Runtime Security Capabilities
-
Cybersecurity for Remote Work: Securing Virtual Environments and Endpoints
-
The Cyber Threat Intelligence Paradox – Why too much data can be detrimental and what to do about it
-
Advancing SOAR Technology: Key 2023 Updates in Incident Response Automation
Generated on 2023-12-23 23:55:46.333573