- INC RANSOM ransomware gang claims to have breached Xerox Corp
-
RingGo: Phone Parking Service Suffers Data Breach, Customer Data Stolen
-
China Arrests 4 Who Weaponized ChatGPT for Ransomware Attacks
-
States Attack Young People’s Constitutional Right to Use Social Media: 2023 Year in Review
-
Fighting European Threats to Encryption: 2023 Year in Review
-
Hackers are Launching DDoS Attacks During Peak Business Hours
-
Parent Company of CBS and Paramount Discloses Cybersecurity Breach Impacting 80K Individuals
-
It’s not all doom and gloom: When cybersecurity gave us hope in 2023
-
Beware: Scam-as-a-Service Aiding Cybercriminals in Crypto Wallet-Draining Attacks
-
The password identity crisis: Evolving authentication methods in 2024 and beyond
-
Why training LLMs with endpoint data will strengthen cybersecurity
-
Cyber attacks hit the Assembly of the Republic of Albania and telecom company One Albania
-
USENIX Security ’23 – ‘Tubes Among Us: Analog Attack on Automatic Speaker Identification’
-
Imperva defends customers against recent vulnerabilities in Apache OFBiz
-
Fighting For Your Digital Rights Across the Country: Year in Review 2023
-
First, Let’s Talk About Consumer Privacy: 2023 Year in Review
-
Malware Leveraging Google Cookie Exploit via OAuth2 Functionality
-
Key Aspects of API Evolution: Version Control in Multi-Environments With API7 Enterprise
-
Facebook Is Still Making Billions In Ad Revenue From Kids’ Data
-
China arrests 4 people who developed ChatGPT based ransomware
-
Russia-linked APT28 used new malware in a recent phishing campaign
-
From DarkGate to AsyncRAT: Malware Detected and Shared As Unit 42 Timely Threat Intelligence
-
Best of 2023: Combo Lists & the Dark Web: Understanding Leaked Credentials
-
Albanian Parliament and One Albania Telecom Hit by Cyber Attacks
-
In Other News: Ubisoft Hack, NASA Security Guidance, TikTok Requests iPhone Passcode
-
Twitter/X Fails To Block Content Moderation Disclosure Law In California
-
Cyber Security Today, Dec. 29, 2023 – Get cracking on your cybersecurity strategic plan
-
iPhone Spyware Exploits Obscure Chip Feature, Targets Researchers
-
New Medusa Stealer Attacking Users to Steal Login Credentials
-
AI Is Scarily Good at Guessing the Location of Random Photos
-
Pentagon Wants Feedback on Revised Cybersecurity Maturity Model Certification Program
-
CERT-UA Uncovers New Malware Wave Distributing OCEANMAP, MASEPIE, STEELHOOK
-
Europe’s Largest Parking App Provider Informs Customers of Data Breach
-
Operations, Trading of Eagers Automotive Disrupted by Cyberattack
-
Digital Battlefields: Artists Employ Technological Arsenal to Combat AI Copycats
-
Develop Valuable Security and Risk Management Skills for Just $30 Through 1/1
-
Kimsuky Hackers Deploying AppleSeed, Meterpreter, and TinyNuke in Latest Attacks
-
CEO arranged his own cybersecurity, with predictable results
-
Microsoft Disables MSIX App Installer Protocol Widely Used in Malware Attacks
-
Navigating Cloud Security: A Comparative Analysis of IaaS, PaaS, and SaaS
-
Why you need to extend enterprise IT security to the mainframe
-
Tech upgrades for first responders are a necessity, not a luxury
-
Privacy Education for Students: A Vital Curriculum Component
-
Why attackers love to target misconfigured clouds and phones
-
Operation Triangulation attacks relied on an undocumented hardware feature
Generated on 2023-12-30 23:55:33.069068