Lost and Stolen Devices: A Gateway to Data Breaches and Leaks
In our digital age, data is king. It drives businesses, informs decision-making, and plays an essential role in our everyday...
Read more →In our digital age, data is king. It drives businesses, informs decision-making, and plays an essential role in our everyday...
Read more →Hackers are scanning for internet-exposed Jupyter Notebooks to breach servers and deploy a cocktail of malware consisting of a Linux...
Read more →Thales announced the SafeNet IDPrime FIDO Bio Smart Card, a security key that enables strong MFA for the enterprise. This...
Read more →Oct 18, 2023NewsroomRootkit / Cryptocurrency A threat actor, presumably from Tunisia, has been linked to a new campaign targeting exposed...
Read more →The Competition and Markets Authority (CMA) has provided some further details on the initial scope of its anti-trust investigation into...
Read more →Fraud prevention provider Fingerprint on Tuesday announced that it has raised $33 million in a Series C funding round that...
Read more →A flaw in Synology DiskStation Manager allows admin account takeover Pierluigi Paganini October 18, 2023 A vulnerability in Synology DiskStation...
Read more →A critical vulnerability tracked as CVE-2023-4966 in Citrix NetScaler ADC/Gateway devices has been actively exploited as a zero-day since late August,...
Read more →Malware distribution on users’ computers is achieved through phony browser updates presented on websites that hackers have hijacked. When a...
Read more →Cryptojackers are targeting exposed Jupyter Notebooks to install cryptominers and steal credential files for popular cloud services, researchers have uncovered....
Read more →Open warfare returned to the Middle East in the early hours of Saturday 7 October, when Hamas operatives stormed the...
Read more →Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by...
Read more →