PartnerLeak scam site promises victims full access to “cheating” partner’s stolen data
Earlier this week, we reported on a new type of scam that tells you your partner is cheating on you. However, we hit a dead…
Earlier this week, we reported on a new type of scam that tells you your partner is cheating on you. However, we hit a dead…
As part of its investigation into a cyber security incident affecting Transport for London (TfL), the National Crime Agency has said it has arrested a…
U.K.’s National Crime Agency says it arrested a 17-year-old teenager who is suspected of being connected to the cyberattack on Transport for London, the city’s…
Mastercard has announced a significant expansion of its cybersecurity services through an agreement to acquire Recorded Future, a leading global threat intelligence company. The acquisition,…
In a strategic move to bolster its cybersecurity capabilities, Mastercard has announced an agreement to acquire Recorded Future, a leading global threat intelligence company, for…
A recent National Crime Agency (NCA) investigation led to the arrest of a teenager in Walsall, England, linked to a cyberattack on Transport for London…
Alert for Software Developers: North Korea’s Lazarus Group Targets with Malicious Emails A recent study by ReversingLabs has revealed that North Korea’s Lazarus Group is…
We’ve uncovered a malicious campaign going after Mac users looking for support or extended warranty from Apple via the AppleCare+ support plans. The perpetrators are…
Kubernetes deployments offer plenty of advantages to enterprises that want to update their infrastructure and move to a cloud-native architecture. But a lot of what…
Transport for London (TfL) has determined that the cyberattack on September 1 impacts customer data, including names, contact details, email addresses, and home addresses. The urban…
A threat actor claimed unauthorized access to a third-party cloud-based file-sharing service used by Fortinet. The incident reportedly affected several Fortinet customers in the Asia-Pacific…
Exploiting memory corruption vulnerabilities in server-side software often requires knowledge of the binary and environment, which limits the attack surface, especially for unknown binaries and…