Cyber Crime: INTERPOL Uses Trend Threat Intelligence
INTERPOL recently conducted operation African Surge to take down malicious infrastructure across the African continent and requested the help of...
INTERPOL recently conducted operation African Surge to take down malicious infrastructure across the African continent and requested the help of...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
CISA added a critical flaw impacting Oracle Fusion Middleware, tracked as CVE-2021-35587, to its Known Exploited Vulnerabilities Catalog. The U.S. Cybersecurity...
In today’s technological world, educating people about cybersecurity awareness is an absolute necessity. According to one report, 82% of data...
Irish data protection commission (DPC) fined Meta for not protecting Facebook’s users’ data from scraping. Meta has been fined €265 million...
Our last edition of privacy predictions focused on a few important trends where business and government interests intersect, with regulators...
The consumer threat landscape constantly changes. Although the main types of threats (phishing, scams, malware, etc.) remain the same, lures...
Massive growth in cloud use has increased the enterprise attack surface. Addressing the risks with specialized point solutions is unwieldy,...
ESET announced the discovery of a vulnerability impacting Acer laptops that can allow an attacker to deactivate UEFI Secure Boot....
Amazon Web Services (AWS) fixed a cross-tenant vulnerability that could have allowed attackers to gain unauthorized access to resources. Amazon...
Several Ukrainian organizations were hit by Russia-based RansomBoggs Ransomware in the last week, ESET reports. Researchers from ESET observed multiple...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
The U.S. Federal Communications Commission announced it will completely ban the import of electronic equipment from Huawei, ZTE, Hytera, Hikvision,...
The massive data breach suffered by Twitter that exposed emails and phone numbers of its customers may have impacted more...
Every time you go online, someone is watching over you. The services you use, the websites you visit, the apps...
Researchers discovered that devices from Dell, HP, and Lenovo are still using outdated versions of the OpenSSL cryptographic library. Binarly researchers discovered...
Google on Thursday released security updates to address a new zero-day vulnerability, tracked as CVE-2022-4135, impacting the Chrome web browser....
Cybernews investigated a data sample available for sale containing up-to-date mobile phone numbers of nearly 500 million WhatsApp users. Original...
An international law enforcement operation has dismantled an online phone number spoofing service called iSpoof. An international law enforcement operation that...
The British government banned the installation of Chinese-linked security cameras at sensitive facilities due to security risks. Reuters reports that...
RansomExx ransomware is the last ransomware in order of time to have a version totally written in the Rust programming...
Researchers warn of an ongoing aggressive Qakbot malware campaign that leads to Black Basta ransomware infections in the US. Experts...
Microsoft reported that hackers have exploited flaws in a now-discontinued web server called Boa in attacks against critical industries. Microsoft experts...
The shopping event of the year, Black Friday, is almost here, and while the big day does not officially arrive...