How attackers abuse S3 Bucket Namesquatting — And How to Stop Them
With the sheer amount of data and users leveraging AWS, it’s easy for misconfigurations to slip through the cracks. One...
Read more →With the sheer amount of data and users leveraging AWS, it’s easy for misconfigurations to slip through the cracks. One...
Read more →The Spanish police have arrested a suspected hacker in Alicante for allegedly conducting 40 cyberattacks targeting critical public and private organizations,...
Read more →Zyxel has issued a security advisory about actively exploited flaws in CPE Series devices, warning that it has no plans...
Read more →Android and iOS apps on the Google Play Store and Apple App Store contain a malicious software development kit (SDK)...
Read more →Five Eyes cybersecurity agencies in the UK, Australia, Canada, New Zealand, and the U.S. have issued guidance urging makers of...
Read more →A Chinese hacking group is hijacking the SSH daemon on network appliances by injecting malware into the process for persistent...
Read more →A 7-Zip vulnerability allowing attackers to bypass the Mark of the Web (MotW) Windows security feature was exploited by Russian...
Read more →Netgear has fixed two critical vulnerabilities affecting multiple WiFi router models and urged customers to update their devices to the...
Read more →As the gateways to corporate networks, VPNs are an attractive target for attackers seeking access to Active Directory environments. And...
Read more →A 59-year-old man from Irvine, California, was sentenced to 87 months in prison for his involvement in an investor fraud...
Read more →Food delivery company GrubHub disclosed a data breach impacting the personal information of an undisclosed number of customers, merchants, and...
Read more →The first Apple-notarized porn app, “Hot Tub,” is now available to iPhone users in Europe through the alternative app marketplace,...
Read more →