TELUS investigating leak of stolen source code, employee data
Canada’s second-largest telecom, TELUS is investigating a potential data breach after a threat actor shared samples online of what appears to...
Read more →Canada’s second-largest telecom, TELUS is investigating a potential data breach after a threat actor shared samples online of what appears to...
Read more →The Computer Emergency Response Team of Ukraine (CERT-UA) says Russian state hackers have breached multiple government websites this week using...
Read more →A Federal grand jury in the District of Oregon has indicted four Russian nationals founders of Forsage decentralized finance (DeFi) cryptocurrency...
Read more →Microsoft says admins should remove some previously recommended antivirus exclusions for Exchange servers to boost the servers’ security. As the company explained,...
Read more →The U.S. Federal Trade Commission (FTC) revealed today that Americans lost almost $8.8 billion to various types of scams in...
Read more →Game developer Valve has announced that it permanently banned more than 40,000 accounts for using cheating software to gain an unfair...
Read more →A Russian malware developer accused of creating and selling the NLBrute password-cracking tool was extradited to the United States after...
Read more →Dole Food Company, one of the world’ largest producers and distributors of fresh fruit and vegetables, has announced that it is dealing...
Read more →Pen testing is an essential part of secure application development; it helps find vulnerabilities before they can be exploited, ensures...
Read more →A previously unknown threat actor named Hydrochasma has been targeting shipping and medical laboratories involved in COVID-19 vaccine development and treatments....
Read more →Threat actors are targeting Internet-exposed Fortinet appliances with exploits targeting CVE-2022-39952, an unauthenticated file path manipulation vulnerability in the FortiNAC...
Read more →Google last year paid its highest bug bounty ever through the Vulnerability Reward Program for a critical exploit chain report...
Read more →