META hit with privacy complaints by EU consumer groups
META hit with privacy complaints by EU consumer groups Pierluigi Paganini March 04, 2024 This is my interview with TRT International on the Meta dispute…
META hit with privacy complaints by EU consumer groups Pierluigi Paganini March 04, 2024 This is my interview with TRT International on the Meta dispute…
The National Intelligence Service (NIS) in South Korea warns that North Korean hackers target domestic semiconductor manufacturers in cyber espionage attacks. NIS says these attacks…
A U.S. district court has mandated that the Israeli firm NSO Group, known for its Pegasus spyware, must provide WhatsApp with documents and code linked…
The Middle East and Africa (MEA) region has witnessed a surge in ransomware-as-a-service (RaaS) attacks, posing a grave threat to digital security. This comprehensive report…
04 Mar Top 100 Cybersecurity Influencers In 2024 This week in cybersecurity from the editors at Cybercrime Magazine – Read the Full Story in Feedspot…
Malicious software packages are found on public software repositories such as GitHub, PyPI and the npm registry seemingly every day. Attackers use a number of…
The European Parliament has revoked the access badges of Amazon lobbyists, preventing easy access to its buildings, after the firm failed to attend multiple meetings…
A new botnet named “COVID BOTNET” is being advertised on the dark web, claiming to target NATO servers and the broader Western digital infrastructure. The…
Meta, the company that owns WhatsApp, filed a lawsuit against NSO Group in 2019. The lawsuit claims that NSO took advantage of a vulnerability in…
In recent years, the landscape of cyber threats has evolved dramatically, with the emergence of AI-powered attacks posing new and formidable challenges. MIT security researchers…
A new phishing campaign is using fake Okta single sign-on (SSO) pages for the Federal Communications Commission (FCC) and for various cryptocurrency platforms to target…
Mar 04, 2024The Hacker NewsSaaS Security / Vulnerability Assessment A company’s lifecycle stage, size, and state have a significant impact on its security needs, policies,…