Volkswagen Hacked – Hackers Stolen 19,000 Documents
Volkswagen, one of the world’s leading automotive manufacturers, has fallen victim to a sophisticated hacking operation in a significant cybersecurity breach. Investigations suggest that the…
Volkswagen, one of the world’s leading automotive manufacturers, has fallen victim to a sophisticated hacking operation in a significant cybersecurity breach. Investigations suggest that the…
According to the Department for Science, Innovation and Technology (DSIT), only 17% of the UK cyber sector workforce is female, and this is down from…
The widely used MySQL2 has been discovered to have three critical vulnerabilities: remote Code execution, Arbitrary code injection, and Prototype Pollution. These vulnerabilities have been…
Security awareness training and phishing simulation specialist KnowBe4, the firm behind the popular Inside Man cyber training movies, has announced it is to buy UK-founded…
The Federal Trade Commission is sending $5.6 million in refunds to Ring users whose private video feeds were accessed without consent by Amazon employees and…
CrushFTP disclosed a zero-day vulnerability (CVE-2024-4040) affecting versions below 10.7.1 and 11.1.0. The vulnerability allows remote attackers with low privileges to bypass the VFS sandbox…
AI-powered generative tools have supercharged phishing threats, so even newbie attackers can effortlessly create refined, individualized campaigns. Protecting data and systems from this democratization of…
24 Apr An MSSP Shares the Latest in Ransomware: What’s Up, and What to Do About It What are the major trends in ransomware today?…
Apr 24, 2024NewsroomMalware / Endpoint Security Cybersecurity researchers have discovered an ongoing attack campaign that’s leveraging phishing emails to deliver malware called SSLoad. The campaign,…
A bill giving TikTok’s China-based owner ByteDance until January 2025 to sell up or get out of town has sailed through the Senate, the upper…
Hackers hijacked the eScan Antivirus update mechanism in malware campaign Pierluigi Paganini April 24, 2024 A malware campaign has been exploiting the updating mechanism of…
Threat actors exploit fake Android apps primarily for illicit reasons, such as stealing sensitive and personal information from unsuspecting users. Besides this, these fake apps…