Google Malware Abusing Api Is Standard Token Theft Not An Api Issue
Google is downplaying reports of malware abusing an undocumented Google Chrome API to generate new authentication cookies when previously stolen...
Google is downplaying reports of malware abusing an undocumented Google Chrome API to generate new authentication cookies when previously stolen...
The Memorial University of Newfoundland (MUN) continues to deal with the effects of a cyberattack that occurred in late December...
Security researchers are detecting hundreds of IP addresses on a daily basis that scan or attempt to exploit Apache RocketMQ services...
The U.S. Department of Justice announced the end of a transnational investigation into the dark web xDedic cybercrime marketplace, charging 19...
With it being the first week of the New Year and some still away on vacation, it has been slow...
A crypto wallet service co-founder shares with the world his agony after losing $125,000 to a crypto scam. The startup...
The Twitter/X account of blockchain security firm CertiK was hijacked today to redirect the company's more than 343,000 followers to...
The administrator behind the notorious BreachForums hacking forum has been arrested again for breaking pretrial release conditions, including using an...
Cyber-attacks targeting Web3 cost organizations $1.84bn in 2023 across 751 incidents, according to Certik’s Hack3d: The Web3 Security Report 2023.The...
HealthEC LLC, a provider of health management solutions, suffered a data breach that impacts close to 4.5 million individuals who received...
The U.S. Cybersecurity and Infrastructure Security Agency has added two vulnerabilities to the Known Exploited Vulnerabilities catalog, a recently patched...
Almost 11 million internet-exposed SSH servers are vulnerable to the Terrapin attack that threatens the integrity of some SSH connections....
The U.S. Federal Trade Commission (FTC) has started accepting submissions for its Voice Cloning Challenge, a public competition with a...
Hackers are increasingly targeting verified accounts on X (formerly Twitter) belonging to government and business profiles and marked with 'gold'...
Ivanti fixed a critical remote code execution (RCE) vulnerability in its Endpoint Management software (EPM) that can let unauthenticated attackers hijack...
Over the holidays, the npm package registry was flooded with more than 3,000 packages, including one called "everything," and others named a...
The Russian hackers behind a December breach of Kyivstar, Ukraine's largest telecommunications service provider, have wiped all systems on the...
A threat actor announced on a cybercrime forum that they sold the source code and a cracked version of the...
Updates added below The Twitter account of American cybersecurity firm and Google subsidiary Mandiant was hijacked earlier today to impersonate the...
Orange Spain suffered an internet outage today after a hacker breached the company's RIPE account to misconfigure BGP routing and...
Adult media giant Aylo has blocked access to many of its websites, including PornHub, to visitors from Montana and North...
A Nigerian national was arrested in Ghana and is facing charges related to business email compromise (BEC) attacks that caused...
LastPass notified customers today that they are now required to use complex master passwords with a minimum of 12 characters...
Over 100 European banks will be tested on their cyber-attack response and recovery capabilities this year, the European Central Bank...