Advertisers and web trackers have been able to aggregate users’ information across all of the websites they visit for decades, primarily by placing third-party cookies in...
As Chief Compliance Officers (CCOs) continue to face challenges in restoring employee misconduct reporting to pre-pandemic levels, there are three strategies they should implement to increase...
Cybercriminals are scamming each other out of millions of dollars and use arbitration to settle disputes about the scams, according to Sophos. For this report, Sophos...
Researchers have disclosed a critical issue in Hyundai and Genesis vehicles that could be exploited to remotely control a car. Yuga Labs staff security engineer Sam...
Researchers have disclosed a critical issue in Hyundai and Genesis vehicles that could be exploited to remotely control a car. Yuga Labs staff security engineer Sam...
UPDATED A series of flaws in Tailscale, an open source mesh virtual private network (VPN) software, could allow attackers to stage remote code execution (RCE) attacks against...
A security researcher has released details of how they were able to hack Intel’s Data Center Manager (DCM). More specifically, Julien Ahrens of RCE Security succeeded...
A vulnerability in Amazon Web Services (AWS) AppSync enabled unauthorized cross-account access to AWS resources, according to the findings of security researchers. AppSync is a service...
Security researchers from Varonis have published details of SQL injection and logical access vulnerabilities in Zendesk Explore that posed a severe threat for users of the popular customer...
Attackers could steal password credentials from Mastodon users due to a vulnerability in Glitch, a fork of Mastodon, a researcher has warned. Mastodon has risen in...
Recent Comments