Category: CyberSecurityNews
Partnership aims to help businesses eliminate vulnerable attack surfaces and provide a more streamlined user experience. Badge Inc., the award-winning…
A bastion host is a critical line of defense, acting as a fortified gateway between an internal network and external…
A critical set of vulnerabilities in the Common Unix Printing System (CUPS) has been disclosed, allowing remote attackers to execute…
Ukrainian hackers launched a large-scale attack on Russian state media company VGTRK on October 7, coinciding with President Vladimir Putin’s…
LemonDuck malware has evolved from a cryptocurrency mining botnet into a “versatile malware” that is capable of “stealing credentials,” “disabling…
DMARC is an email authentication protocol that helps domain owners protect against unauthorized use like “email spoofing” and “phishing attacks.”…
DNS tunneling is a hacking technique that hides information by taking advantage of the DNS protocol. This attack enables threat…
A recent study has shed light on the extensive use of Automatic Content Recognition (ACR) technology by smart TVs to…
iTunes is a media player which is developed by Apple Inc. and this application enables users to purchase, organize, and…
Casio Computer Co., Ltd., a renowned Japanese electronics manufacturer, has confirmed a significant cybersecurity breach that occurred on October 5,…
American Water Works Company, Inc., the largest regulated water and wastewater utility in the United States, reported a cybersecurity incident…
MoneyGram Payment Systems, Inc. confirmed that hackers accessed and stole sensitive customer data, including personal information and transaction details. The…










