Uber and Rockstar – has a LAPSUS$ linchpin just been busted (again)?
September 24 2022Is this the same suspect as before? Is he part of LAPSUS$? Is this the man who hacked Uber and Rockstar? And, if so, who else?
Read moreIs this the same suspect as before? Is he part of LAPSUS$? Is this the man who hacked Uber and Rockstar? And, if so, who else?
Read moreThis one has chewed-up tentacles. (Note that this is a different squid than the one that recently washed up on a South African beach.) As usual, you can also use this...
Read moreSlack, Docker, Kubernetes, and other applications that allow developers to collaborate have become the latest vector for software supply chain attacks.
Read moreThe ongoing ad fraud campaign can be traced back to 2019, but recently expanded into the iOS ecosystem, researchers say.
Read moreA 36-year-old Russian man recently identified by KrebsOnSecurity as the likely proprietor of the massive RSOCKS botnet has been arrested in Bulgaria at the request of U.S. authorities. At...
Read moreThe bug allows unauthenticated code execution on the company's firewall products, and CISA says it poses "significant risk" to federal government.
Read moreCybercriminals took control of enterprise Exchange Servers to spread large amounts of spam aimed at signing people up for bogus subscriptions.
Read moreManufacturers need to document a medical device's intended use and operational environment, as well as plan for misuse, such as a cyberattack.
Read moreCritical data on old disks always seems inaccessible if you really need it. But when you DON''T want it back, guess what happens...
Read moreFrom creating a software bill of materials for applications your company uses to supporting open source projects and maintainers, businesses need to step up their efforts to help reduce...
Read more
Recent Comments