Google Cloud Storage Bucket Leak Tied To Shark Tank Contestant
A misconfigured Google Cloud Storage bucket linked to Alice’s Table, a popular virtual floral arrangement platform, has exposed the personal...
Read more →A misconfigured Google Cloud Storage bucket linked to Alice’s Table, a popular virtual floral arrangement platform, has exposed the personal...
Read more →Park’N Fly is warning that a data breach exposed the personal and account information of 1 million customers in Canada...
Read more →The eight Android and iOS apps fail to adequately protect user data, which transmits sensitive information, such as device details,...
Read more →The United States Supreme Court recently stymied recent cyber security regulations and plans. To fight the proliferation of cyber security...
Read more →Hackers relentlessly probe your organization’s digital defenses, hunting for the slightest vulnerability to exploit. And while penetration testing serves as...
Read more →Malicious hackers are exploiting a zero-day vulnerability in Versa Director, a software product used by many Internet and IT service...
Read more →The China-nexus cyber espionage group tracked as Volt Typhoon has been attributed with moderate confidence to the zero-day exploitation of...
Read more →In the modern workplace, the proliferation of endpoints has significantly expanded the attack surface, presenting new security challenges for organisations....
Read more →A massive QR code phishing campaign abused Microsoft Sway, a cloud-based tool for creating online presentations, to host landing pages...
Read more →In April 2024, the FBI warned about a new type of smishing scam. Smishing is the term we use for...
Read more →Want to know what’s the latest and greatest in SecOps for 2024? Gartner’s recently released Hype Cycle for Security Operations...
Read more →Cisco has announced its intent to acquire Robust Intelligence, a leader in AI application security. This acquisition aligns with Cisco’s...
Read more →