New MOVEit Transfer zero-day mass-exploited in data theft attacks
Hackers are actively exploiting a zero-day vulnerability in the MOVEit Transfer file transfer software to steal data from organizations. MOVEit Transfer is a managed file…
Hackers are actively exploiting a zero-day vulnerability in the MOVEit Transfer file transfer software to steal data from organizations. MOVEit Transfer is a managed file…
The recent sentencing of two Nigerian nationals, Soloman Ekunke Okpe and Johnson Uke Obogo, yet again has drawn attention to the pervasive nature of online…
The Metropolitan Police Services’ (MPS) director of intelligence has defended the force’s use of facial-recognition technology to a Parliamentary committee, as part of its inquiry…
Amazon has agreed to pay a fine of $25 million to settle allegations made by the US Federal Trade Commission (FTC) stating that the company…
On July 2nd, 2015, HackerOne reached 10,000 valid security vulnerabilities resolved on our platform – that’s 10,000 fewer ways for attackers to exploit users, steal…
IT hygiene is a security best practice that ensures that digital assets in an organization’s environment are secure and running properly. Good IT hygiene includes…
The ways that artificial intelligence (AI) will impact upon our lives are being determined by governments and corporations, with little input from ordinary people, says…
Google Workspace (formerly G Suite) has a weak spot that can prevent the discovery of data exfiltration from Google Drive by a malicious outsider or…
Jun 01, 2023Ravie LakshmananProgramming / Supply Chain Researchers have discovered a novel attack on the Python Package Index (PyPI) repository that employs compiled Python code…
Experienced retail technologist Adam Warne made an important transition when he became CIO at high street fashion brand River Island in October 2021. “I’ve been…
AvidXchange, a company allegedly targeted in a ransomware attack, is now facing data leaks orchestrated by several cybercriminal groups. These groups have taken to the…
By Ericka Chickowski Security summer camp is upon us as Black Hat is just a few days away. The infosec community was busy with research…