Google: Hack-for-Hire Groups Present a Potent Threat
June 30 2022Cyber mercenaries in countries like India, Russia, and the UAE are carrying out data theft and hacking missions for a wide range of clients across regions, a couple of...
Read moreCyber mercenaries in countries like India, Russia, and the UAE are carrying out data theft and hacking missions for a wide range of clients across regions, a couple of...
Read moreWired is reporting on a new remote-access Trojan that is able to infect at least eighty different targets:
So far, researchers from Lumen Technologies’ Black Lotus Labs say they’ve...
Read more
It didn't have to be this way: So far 2022's tranche of zero-days shows too many variants of previously patched security bugs, according Google Project Zero.
Read moreA recent analysis of breaches involving application programming interfaces (APIs) arrives at some eye-popping damage figures, but which companies are most affected, and in what ways?
Read moreMalicious ISS module exploitation is the latest trend among threat actors targeting Exchange servers, analysts say.
Read moreTitaniam’s ‘State of Data Exfiltration & Extortion Report’ also finds that while over 70% of organizations had heavy investments in prevention, detection, and backup solutions, the majority of victims...
Read moreA password link that didn't expire leads to the discovery of exposed personal information at a payments service.
Read moreA password link that didn't expire leads to the discovery of exposed personal information at a payments service.
Read moreNXM Autonomous Security protects against network-wide device hacks and defends against critical IoT vulnerabilities.
Read moreAn unauthenticated remote code execution vulnerability found in Zoho’s compliance tool could leave organizations exposed to an information disclosure catastrophe, new analysis shows.
Read more
Recent Comments