Anonfiles, a popular service for sharing files anonymously, has shut down after saying it can no longer deal with the...
A new malware campaign disguised as Google Translate or MP3 downloader programs was found distributing cryptocurrency mining malware across 11 countries. The fake applications are being...
The threat actor behind the Twilio hack used their access to steal one-time passwords (OTPs) delivered over SMS from customers of Okta identity and access management...
DuckDuckGo has opened its ‘Email Protection’ service to anyone wishing to get their own ‘@duck.com’ email address. The free service was launched as a closed beta...
Hackers have created a fake ‘Cthulhu World’ play-to-earn community, including websites, Discord groups, social accounts, and a Medium developer site, to distribute the Raccoon Stealer, AsyncRAT, and...
Although quantum computing is not commercially available, CISA (Cybersecurity and Infrastructure Security Agency) urges organizations to prepare for the dawn of this new age, which is...
Food delivery firm DoorDash has disclosed a data breach exposing customer and employee data that is linked to the recent cyberattack on Twilio. In a security...
The North Korean ‘Kimsuky’ threat actors are going to great lengths to ensure that their malicious payloads are only downloaded by valid targets and not on...
Hackers are abusing an anti-cheat system driver for the immensely popular Genshin Impact game to disable antivirus software while conducting ransomware attacks. The driver/module, “mhypro2.sys,” doesn’t...
https://player.vimeo.com/video/740662440?h=b26b1336a9&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 During AWS re:Inforce, Amazon executives emphasized how important access control is when it comes to cloud security and why IT leaders need to ask who...
Veracode released data revealing that the financial services industry ranks among the best for overall flaw percentage when compared to other industries, but has one of...
Recent Comments