Cloud flaws brought to the fore as bug bounty vulnerabilities hit 65k in 2022 - HackerOne
26
Dec
2022

Cloud flaws brought to the fore as bug bounty vulnerabilities hit 65k in 2022 – HackerOne

Impact of cloud migration and shift to remote work evident in new report Bug bounty hunters are increasingly unearthing cloud-based…

26
Dec
2022

Cuba Ransomware Gang Abused Microsoft Certificates to Sign Malware

Less than two weeks ago, the United States Cybersecurity & Infrastructure Security Agency and FBI released a joint advisory about…

Twitter Data Breach +400 million users data leaked
26
Dec
2022

Twitter Data Breach +400 million users data leaked

A threat actor has made the claim that they have gotten the personal information of 400 million users of Twitter…

Fortnite Maker Epic Games
26
Dec
2022

FTC Fines Fortnite Maker Epic Games $275 Million for Violating Children’s Privacy Law

Dec 20, 2022Ravie LakshmananPrivacy / Data Security Epic Games has reached a $520 million settlement with the U.S. Federal Trade…

Undesirable program
26
Dec
2022

ShadowsocksS – ShadowsocksS – Program Information

SHADOWSOCKSS Information This is an undesirable program. This file has been identified as a program that is undesirable to have…

Akamai WAF bypassed via Spring Boot to trigger RCE
26
Dec
2022

Akamai WAF bypassed via Spring Boot to trigger RCE

Charlie Osborne 14 December 2022 at 12:01 UTC Updated: 19 December 2022 at 09:53 UTC Akamai issued an update to…

26
Dec
2022

#MIWIC2022: Sydonie Williams, Beazley – IT Security Guru

Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim…

Researchers Quietly Cracked Zeppelin Ransomware Keys – Krebs on Security
26
Dec
2022

Researchers Quietly Cracked Zeppelin Ransomware Keys – Krebs on Security

Peter is an IT manager for a technology manufacturer that got hit with a Russian ransomware strain called “Zeppelin” in…

26
Dec
2022

A New Lawsuit Accuses Meta of Inflaming Civil War in Ethiopia

On November 3, 2021, Meareg Amare, a professor of chemistry at Bahir Dar University in Ethiopia, was gunned down outside…

How to exploit Antivirus and EDR solutions flaws to delete data from victim device without admin rights
26
Dec
2022

How to exploit Antivirus and EDR solutions flaws to delete data from victim device without admin rights

A security researcher has discovered a technique to harness the data deletion capabilities of widely used endpoint detection and response…

Brave open-source web browser
26
Dec
2022

New Privacy-Focused Database Querying System

Dec 23, 2022Ravie LakshmananEncryption / Privacy / Browser The developers behind the Brave open-source web browser have revealed a new…

Undesirable program
26
Dec
2022

PCOptimize – PCOptimize.exe – Program Information

PCOPTIMIZE.EXE Information This is an undesirable program. This file has been identified as a program that is undesirable to have…