The Ukranian Cyber police officers tracked down the 36-year-old resident of Netishyn as he was selling the personal data of more than 300 million victims from...
Cybersecurity analysts at Horizon3 detected that thousands of Apache Superset servers are exposed to RCE attacks at default configurations. This could allow the threat actors to...
Google uses Cryptbot info stealer for infecting Chrome users and stealing data, taking down associated malware infrastructure. The sole goal of this lawsuit is to reduce...
Recently, the cybersecurity researchers at Cyble discovered a new macOS malware, ‘Atomic’ (aka ‘AMOS’), sold for $1,000/month on private Telegram channels. Buyers pay a high price...
Single Sign-On, as the name suggests, is about signing in on no app and signing in on different types of apps without authenticating on other apps....
Recently, a group of threat actors have disguised their malware as 38 Minecraft-inspired games on Google Play, infecting unsuspecting devices with the insidious ‘HiddenAds’ adware. While...
Keylogger is a malicious computer program that records everything you type on the keyboard, learns the keystroke pattern, including words, characters, and symbols, and sends all...
Every company should have an eye on its cybersecurity. But SaaS companies have their own set of concerns to be mindful of. With their business model...
The U.S. Cybersecurity Infrastructure Security Agency (CISA) and the FDA have issued an urgent alert about two vulnerabilities that impact Illumina’s Universal Copy Service (UCS), used...
Hackers are hijacking online stores to display modern, realistic-looking fake payment forms to steal credit cards from unsuspecting customers. These payment forms are shown as a...
Recent Comments