Security flaws in chipsets used by more than 65 IoT device manufacturers have been identified by researchers. The vulnerabilities affect WiFi-enabled devices using a software development kit (SDK)...
Every day, swathes of global bad actors attempt to attack your critical company infrastructure. It’s a daunting proposition. What’s more, it can be challenging to know...
A bug on Ford Motor Company’s website allowed for accessing sensitive systems and obtaining proprietary data, such as customer databases, employee records, internal tickets, etc. The data exposure stemmed from...
The Pakistan-linked threat group’s campaign uses compromised WordPress sites to deliver the Warzone RAT to manufacturing companies in Taiwan and South Korea. Threat actors are using...
A security researcher has earned a $7,500 bug bounty after discovering an exploit that could have permitted gamers to boost their in-game Steam wallet balances by artificially increasing...
Security researchers have uncovered three vulnerabilities in fitness and gym management application Wodify that could allow an authenticated user to modify production data and extract sensitive personal information....
Security researchers found vulnerabilities in the Wodify fitness platform that allows an attacker to view and modify user workouts from any of the more than 5,000 gyms...
Ipsos conducted a research which examines attitudes, concerns, and impacts on medical device security as well as cybersecurity across large and midsize healthcare delivery organizations. Insights include how...
A social engineering-based malvertising campaign has been discovered targeting Japanese crypto users. The campaign spreads via malicious applications by taking advantage of sideloading vulnerabilities in them....
The underrated threat of related-domain attacks can enable malicious actors to circumvent many advanced website protection mechanisms, a group of researchers at the Technical University of...
Recent Comments