Lost and Stolen Devices: A Gateway to Data Breaches and Leaks
In our digital age, data is king. It drives businesses, informs decision-making, and plays an essential role in our everyday lives. However, with the convenience…
In our digital age, data is king. It drives businesses, informs decision-making, and plays an essential role in our everyday lives. However, with the convenience…
Hackers are scanning for internet-exposed Jupyter Notebooks to breach servers and deploy a cocktail of malware consisting of a Linux rootkit, crypto miners, and password-stealing…
Thales announced the SafeNet IDPrime FIDO Bio Smart Card, a security key that enables strong MFA for the enterprise. This new contactless smart card allows…
Oct 18, 2023NewsroomRootkit / Cryptocurrency A threat actor, presumably from Tunisia, has been linked to a new campaign targeting exposed Jupyter Notebooks in a two-fold…
The Competition and Markets Authority (CMA) has provided some further details on the initial scope of its anti-trust investigation into the UK cloud services market,…
Fraud prevention provider Fingerprint on Tuesday announced that it has raised $33 million in a Series C funding round that brings the total raised by…
A flaw in Synology DiskStation Manager allows admin account takeover Pierluigi Paganini October 18, 2023 A vulnerability in Synology DiskStation Manager (DSM) could be exploited…
A critical vulnerability tracked as CVE-2023-4966 in Citrix NetScaler ADC/Gateway devices has been actively exploited as a zero-day since late August, security researchers announced. The security…
Malware distribution on users’ computers is achieved through phony browser updates presented on websites that hackers have hijacked. When a user visits a hacked website,…
Cryptojackers are targeting exposed Jupyter Notebooks to install cryptominers and steal credential files for popular cloud services, researchers have uncovered. What are Jupyter Notebooks? “Jupyter…
Open warfare returned to the Middle East in the early hours of Saturday 7 October, when Hamas operatives stormed the border between Israel and the…
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by InsiderPhD. Every week, she keeps…