This Week in Security News – January 7th, 2022
This week, read about Log4j vulnerabilities in connected cars and charging stations and how iOS malware can fake iPhone shutdowns...
This week, read about Log4j vulnerabilities in connected cars and charging stations and how iOS malware can fake iPhone shutdowns...
The first of a series of blog posts examines the security risks of Codex, a code generator powered by the...
This week, read about Log4j vulnerabilities in connected cars and charging stations and how iOS malware can fake iPhone shutdowns...
Jon Clay, VP of Threat Intelligence at Trend Micro, explores the latest Trend Micro Research covering Access as a Service...
Finalsite, a popular platform for creating school websites, appears to have recovered significant functionality after being attacked by a still-unknown...
QNAP is warning customers of ransomware attacks targeting network-attached storage (NAS) devices exposed online. Taiwanese vendor QNAP has warned customers...
Patchwork is an Indian threat actor that has been active since December 2015 and usually targets Pakistan via spear phishing...
Three years ago on Quora, someone asked what writers do to keep their manuscripts from being stolen. One of the...
French privacy watchdog, the Commission Nationale de l’Informatique et des Libertés (CNIL), has hit Google with a 150 million euro...
A threat actor attempted to exploit the Log4Shell vulnerability to hack VMWare Horizon servers at UK NHS and deploy web...
Experts warn that the popular antivirus product Norton 360 has installed a cryptocurrency miner on its customers’ computers. Many users...
The appointment scheduling service FlexBooker discloses a data breach that impacted over 3.7 million accounts. Threat actors compromised the FlexBooker...
Researchers warn of a new ransomware family, called ‘Night Sky,’ that uses a double-extortion model in attacks again businesses. Researchers...
North Korea-linked APT group Konni targets Russian Federation’s Ministry of Foreign Affairs (MID) new versions of malware implants. Security researchers...
NY OAG warned 17 companies that roughly 1.1 million of their customers have had their user accounts compromised in credential...
Experts warn of a new phishing technique that abuses the commenting feature of Google Docs to send out emails that...
When removing malware from an iOS device, it is said that users need to restart the device to clear the...
The French data privacy and protection authority hit Google and Facebook with 210 million euros ($237 million) in fines. France’s...
The New York State Office of the Attorney General has warned 17 companies that roughly 1.1 million customers have had...
Two-factor authentication (2FA) has been around for a while now and for the majority of tech users in the US...
Over 100 real estate websites have been compromised by the same web skimmer in a supply chain attack. So what...
Researchers devised a sophisticated persistence technique, named NoReboot, for iOS malware that fake shut downs. Researchers from Zecops devised a...
VMware addressed a heap-overflow issue (CVE-2021-22045) in Workstation, Fusion and CVE-2021-22045 products that can lead to code execution on the...
In this workshop, you’ll learn how to leverage DevOps Security with your serverless applications running on AWS Lambda or containerized...