Fortinet says a critical FortiOS SSL VPN vulnerability that was patched last week “may have been exploited” in attacks impacting...
Russian Foreign Intelligence Service (SVR) operators have switched their attacks to target new vulnerabilities in reaction to US govt advisories published last month with info on...
Cybercriminals are embracing data-theft extortion by creating dark web marketplaces that exist solely to sell stolen data. Long before ransomware gangs started extorting victims through the...
This week Twitter has begun experimenting with a new feature called ‘Tip Jar,’ which lets Twitter users tip select profiles to support their work. Twitter iOS and...
Thursday, May 6 is World Password Day, a day dedicated to promoting safer password practices. Below, security executives share their insight and tips on how to create...
Lookout, Inc. released a report showing that mobile phishing exposure doubled among financial services and insurance organizations between 2019 and 2020. The Lookout Financial Services Threat Report...
Google strives to push all its users to start using two-factor authentication (2FA), which can block attackers from taking control of their accounts using compromised credentials...
A student’s attempt to pirate an expensive data visualization software led to a full-blown Ryuk ransomware attack at a European biomolecular research institute. BleepingComputer has long...
Attackers can use a newly disclosed domain name server (DNS) vulnerability publicly known as TsuNAME as an amplification vector in large-scale reflection-based distributed denial of service...
Google announced the introduction of a privacy information section on the entries of Android applications listed in its Google Play Store digital distribution service starting with...
An unknown threat actor used a new stealthy rootkit to backdoor targeted Windows systems what looks like an ongoing espionage campaign dubbed TunnelSnake going back to at least...
Recent Comments