Ex-Twitter employee Gets 3.5 Years Jail for Spying on Behalf of Saudi Arabia
Dec 16, 2022Ravie LakshmananCyber Espionage / Privacy A former Twitter employee who was found guilty of spying on behalf of Saudi Arabia by sharing data…
Dec 16, 2022Ravie LakshmananCyber Espionage / Privacy A former Twitter employee who was found guilty of spying on behalf of Saudi Arabia by sharing data…
A team of researchers has developed an eavesdropping attack for Android devices that can, to various degrees, recognize the caller’s gender and identity, and even…
The French privacy regulator announced on Thursday that it had penalized Microsoft, a major US technology company, 60 million euros ($64 million) for forcing advertising…
Charlie Osborne 01 December 2022 at 14:30 UTC Updated: 01 December 2022 at 15:51 UTC Vehicles made after 2012 were vulnerable to web app exploit…
Government entities in Ukraine have been breached as part of a new campaign that leveraged trojanized versions of Windows 10 installer files to conduct post-exploitation…
Leading sports betting company BetMGM disclosed a data breach after a threat actor stole personal information belonging to an undisclosed number of customers. While the…
An attacker could masquerade as an authenticated user without presenting credentials An open source Go implementation of the SAML protocol has patched a critical vulnerability…
Apple announced today that it is launching expanded end-to-end encryption protections in its iCloud service. The company already offers the vital security feature for some…
Researchers at Phylum recently discovered that hackers had been injecting information stealer malware into Python developers’ machines in order to steal their information. As they…
Samba has released software updates to remediate multiple vulnerabilities that, if successfully exploited, could allow an attacker to take control of affected systems. The high-severity…
In August 2021, Apple announced a plan to scan photos that users stored in iCloud for child sexual abuse material (CSAM). The tool was meant…
[ This article was originally published here ] SANTA CLARA, Calif.–()–®, the leading independent vendor of Breach and Attack Simulation (BAS) systems, today announced it…