BadBox rapidly grows, 190,000 Android devices infected
22
Dec
2024

BadBox rapidly grows, 190,000 Android devices infected

BadBox rapidly grows, 190,000 Android devices infected Pierluigi Paganini December 21, 2024 Experts uncovered a botnet of 190,000 Android devices…

PHP Zero-Day Vulnerability
21
Dec
2024

Critical PHP 0-Day Vulnerability in Craft CMS Lets Hackers Gain Remote Access

A significant security vulnerability in Craft CMS, one of the most widely used PHP-based content management systems, has been uncovered,…

Ascension Health Hacked
21
Dec
2024

Ascension Health Hacked – Ransomware Attack Compromised 5.6 Million Patients Data

Ascension Health, one of the largest health systems in the United States, has reported a significant data security breach that…

Mastercard Acquired Recorded Future
21
Dec
2024

Mastercard Completes Acquisition of Recorded Future for $2.6 Billion

Mastercard (NYSE: MA) has officially finalized the acquisition of Recorded Future, a leading provider of AI-driven threat intelligence. Mastercard Operating…

HTTP Range Header
21
Dec
2024

Researchers Exploit Reflected Input with HTTP Range Header To Bypass Browser Restriction

Security researchers have uncovered a technique that takes previously unexploitable reflected input vulnerabilities and turns them into fully functional attacks…

WhatsApp Wins NSO group case
21
Dec
2024

WhatsApp Wins NSO Pegasus Spyware Hacking Case After 5-Year Legal Battle

After five years of contentious litigation, Meta Platforms Inc., the parent company of WhatsApp, emerged victorious in its lawsuit against…

McDonald’s Delivery App Vulnerability
21
Dec
2024

McDonald’s Delivery App Vulnerability Let Anyone Place an Order for $0.01

One of India’s most popular food delivery apps, McDonald’s McDelivery, was discovered to have critical vulnerability that could have been…

Testing JavaScript files for bug bounty hunters
21
Dec
2024

Testing JavaScript files for bug bounty hunters

You’ve with no doubt heard or seen other fellow bug bounty hunters find critical vulnerabilities thanks to JavaScript file enumeration,…

Jane Devry
21
Dec
2024

Navigating AI Risks: Best Practices for Compliance and Security

As we head into the new year, organizations face escalating governance, security, and regulatory compliance challenges, especially as AI adoption…

Four Ways to Harden Your Code Against Security Vulnerabilities and Weaknesses
21
Dec
2024

Four Ways to Harden Your Code Against Security Vulnerabilities and Weaknesses

The specter of security vulnerabilities is a constant concern in today’s digital landscape. They’re the hidden pitfalls that can undermine…

Jane Devry
21
Dec
2024

PCI DSS 4.0: A Comprehensive Guide to Enhanced Payment Data Security

In the ever-evolving landscape of cybersecurity, regulation often plays a lagging, but critical role in driving industry wide improvements in…

Mystery Drone Sightings Lead to FAA Ban Despite No Detected Threats
21
Dec
2024

Mystery Drone Sightings Lead to FAA Ban Despite No Detected Threats

It’s been a busy year in cybersecurity, but it’s not over yet. This week, we revealed how hackers figured out…