The Good Guys warns of customer data leak – Security
The Good Guys is the latest company to reveal that some of its customer leaked in a historical data breach at My Rewards. According to…
The Good Guys is the latest company to reveal that some of its customer leaked in a historical data breach at My Rewards. According to…
Threat actors are targeting Internet-exposed Fortinet appliances with exploits targeting CVE-2022-39952, an unauthenticated file path manipulation vulnerability in the FortiNAC webserver that can be abused…
Several data center organizations were recently alerted by Resecurity regarding a malicious cyber campaign that has set its sights on targeting both the organizations and…
Xcitium has unveiled its endpoint security solution, ZeroDwell Containment, for customers with or without legacy EDR products. Xcitium multi-patented technology closes the gaps in enterprise…
We take a look at a ransomware infection which uses a novel approach to payments: asking for the victim’s insurance details. Ransomware authors are wading…
Two former executives at technology services company Unisys must answer questions about their move to join an industry rival, as a US court weighs a…
Google last year paid its highest bug bounty ever through the Vulnerability Reward Program for a critical exploit chain report that the company valued at…
DarkLight and Resecurity partnership will give DarkLight access to Resecurity’s threat intelligence solution called Context, which identifies indications of cyber intrusions and data breaches for…
Which of the myriad, extant cyberthreats should your business be paying the most attention to in 2023? Which of the myriad, extant cyberthreats should your…
Medibank is going to take a $26 million half-year hit as the result of its 2022 security breach, and this is expected to climb to…
The U.S. National Security Agency (NSA) has issued guidance to help remote workers secure their home networks and defend their devices from attacks. The guide…
As of now, the Stealc malware targets only Windows devices and steals data from browsers, cryptocurrency wallets, messengers, and email clients. Cybersecurity researchers from Sekoia…