Security  

  •  
  • By George Dascalu
  • August 11th, 2021
Adobe Fixes Critical Flaws Affecting Magento Shops

Adobe Fixes Critical Flaws Affecting Magento Shops

Magento receives updates for vulnerabilities that allow hackers to take control of e-commerce sites using the platform

  •  
  • By George Dascalu
  • August 11th, 2021
Conti Ransomware Gang Playbook Leaked by Angry Affiliate

Conti Ransomware Gang Playbook Leaked by Angry Affiliate

An enraged low-paid affiliate leaked critical information about the Conti cybercrime gang's RaaS operation

  •  
  • By George Dascalu
  • August 9th, 2021
Gigabyte Suffers Data Breach Following Ransomware Attack

Gigabyte Suffers Data Breach Following Ransomware Attack

RansomEXX launched a powerful ransomware attack and demanded a ransom from the popular Taiwanese PC manufacturer

  •  
  • By George Dascalu
  • August 9th, 2021
FatalRAT: New Trojan Leveraging Telegram

FatalRAT: New Trojan Leveraging Telegram

Cybercriminals discovered a new creative approach to spread malicious software while remaining anonymous

  •  
  • By George Dascalu
  • August 9th, 2021
Amazon Kindle Exposed to Malicious eBooks

Amazon Kindle Exposed to Malicious eBooks

Tens of millions of Kindle devices were reportedly at risk due to a high severity security vulnerability

  •  
  • By George Dascalu
  • August 7th, 2021
Koo, Indian Twitter Alternative, Found Vulnerable to Critical Worm Attacks

Koo, Indian Twitter Alternative, Found Vulnerable to Critical Worm Attacks

The social media clone contains vulnerabilities, making its users vulnerable to malicious JavaScript code

  •  
  • By George Dascalu
  • August 6th, 2021
CISA Launches the Joint Cyber Defense Collaborative (JCDC)

CISA Launches the Joint Cyber Defense Collaborative (JCDC)

Government agencies and the commercial sector must collaborate to do more to safeguard themselves against cyberattacks

  •  
  • By George Dascalu
  • August 6th, 2021
Critical Vulnerabilities Found in macOS Privacy Protections

Critical Vulnerabilities Found in macOS Privacy Protections

Even though the TCC can prevent encryption during a ransomware attack, it still has some flaws that hackers can exploit

  •  
  • By George Dascalu
  • August 6th, 2021
Apple Intends to Scan U.S. iPhones for Images of Child Abuse

Apple Intends to Scan U.S. iPhones for Images of Child Abuse

Researchers warn that iPhone devices may be monitored

  •  
  • By George Dascalu
  • August 5th, 2021
New PayPal Credential Phishing Scam Spotted

New PayPal Credential Phishing Scam Spotted

In recent years, the efforts of hackers to develop sophisticated scam strategies increased significantly

  •  
  • By George Dascalu
  • August 5th, 2021
Chinese Hackers Targeting Russian Federal Agencies

Chinese Hackers Targeting Russian Federal Agencies

Another aggressive hacking spree was initiated by state-backed Chinese cybercriminals using new and innovative malware

  •  
  • By George Dascalu
  • August 5th, 2021
vpnMentor Report Reveals 63M U.S. Users' Information Leaked

vpnMentor Report Reveals 63M U.S. Users' Information Leaked

OneMoreLead experienced a massive Data Breach

  •  
  • By George Dascalu
  • August 5th, 2021
SharePoint File-Shares Exploited in Phishing Campaign

SharePoint File-Shares Exploited in Phishing Campaign

Attackers have spoofed sender addresses to look legitimate

  •  
  • By George Dascalu
  • August 4th, 2021
Google Patches Critical Android Vulnerabilities

Google Patches Critical Android Vulnerabilities

The August 2021 Android Security Bulletin contains fixes for another wave of security vulnerabilities

  •  
  • By George Dascalu
  • August 4th, 2021
Facebook Allegedly Analyzes Encrypted Data Without Deciphering It

Facebook Allegedly Analyzes Encrypted Data Without Deciphering It

This could be the best approach for Facebook to continue its ad targeting efforts and boost its business

  •  
  • By George Dascalu
  • August 4th, 2021
New Chinese Spyware Identified in Massive Cyber Espionage Campaigns

New Chinese Spyware Identified in Massive Cyber Espionage Campaigns

APT31 gathers intelligence from Russia, Mongolia, the United States, and other countries using a new malware

  •  
  • By George Dascalu
  • August 4th, 2021
Raccoon Stealer Spreads Malware Via Google SEO

Raccoon Stealer Spreads Malware Via Google SEO

The stealer-as-a-service platform is capable of stealing cookies, cryptocoins and other sensitive information

 
Want more? Browse: