On June 21, 2023, hackers broke into LetMeSpy’s servers and stole private data. Following the hack, the attackers were able...
NICE Actimize has released a report that identifies and analyzes the leading fraud threats and patterns that impacted leading global financial institutions in 2021. Noting that banking fraud...
Over the past two years, IT departments have served on the business frontlines, helping organizations quickly implement digital transformation strategies to enable a fully remote and...
Advanced adversaries appear to be exploiting the vulnerabilities to get around multifactor authentication. Federal agencies must report to the Cybersecurity and Infrastructure Security Agency over the...
Email addresses typed into online forms are often handed over to web trackers before being submitted and without user consent, a systematic study by computer scientists...
Enterprise IT personnel believe cybersecurity skills are their teams’ most important technical capabilities, according to a new report from the DevOps Institute. Ninety-two percent of respondents...
Meta has fixed a series of bugs that could have allowed a malicious actor to take over a user’s Facebook account, paying their finder a $44,625 bug...
A joint security advisory issued by multiple national cybersecurity authorities revealed today the top 10 attack vectors most exploited by threat actors for breaching networks. The...
Security researchers at the NCC Group have developed a tool to carry out a Bluetooth Low Energy (BLE) relay attack that bypasses all existing protections to authenticate...
The Cybersecurity and Infrastructure Security Agency (CISA) has added two more vulnerabilities to its list of actively exploited bugs, a code injection bug in the Spring...
Hackers are massively exploiting a remote code execution vulnerability, CVE-2021-25094, in the Tatsu Builder plugin for WordPress, which is installed on about 100,000 websites. Up to 50,000...
Recent Comments