Air India suffered a data breach, 4.5 million customers impacted
Air India disclosed a data breach that impacted roughly 4.5 million of its customers, two months after its Passenger Service...
Air India disclosed a data breach that impacted roughly 4.5 million of its customers, two months after its Passenger Service...
CyberNews researchers found that crooks could abuse cryptocurrency exchange API keys and steal cryptocurrencies. Original post available here: https://cybernews.com/security/report-how-cybercriminals-abuse-api-keys-to-steal-millions/ CyberNews...
Indonesia has launched an investigation into a possible security incident that caused the leak of social security data for more...
In June 2013, the Taiwanese website Yam.com suffered a data breach which was shared to a popular hacking forum in...
In August 2020, the Indian retailer Livpure suffered a data breach which exposed over 1 million customer purchases with 270...
Multiple associates have protested about not being charged for past services since the DarkSide ransomware operation was shut down a...
The authors of the study called the growth "staggering." Since the beginning of April, experts have been monitoring ransomware attacks...
Scammers are using a unique methodology called ‘vishing’ to trick online customers. In a vishing attack, the fraudster impersonates someone...
Over recent months, the cybersecurity industry has seen a huge increase in malicious attackers exploiting the networks of Microsoft and...
According to researchers from Wordfence Threat Intelligence, WP Statistics has a Time-Based Blind SQL Injection vulnerability which is a WordPress...
Divide Et Impera And Scan (and also merge the scan results) DivideAndScan is used to efficiently automate port scanning routine...
AutoPentest-DRL is an automated penetration testing framework based on Deep Reinforcement Learning (DRL) techniques. The framework determines the most appropriate...
The US insurance giant CNA Financial reportedly paid a $40 million ransom to restore access to its files following a...
After DarkSide ransomware gang shut down operations, multiple affiliates have complained about not receiving the payments for successful breaches. The...
Microsoft released SimuLand, an open-source tool that can be used to build lab environments to simulate attacks and verify their...
Microsoft warns of a malware campaign that is spreading a RAT dubbed named STRRAT masquerading as ransomware. Microsoft Security Intelligence...
In January 2021, the quiz website Daily Quiz suffered a data breach that exposed over 8 million unique email addresses....
In December 2018, the Indian job portal IIMJobs suffered a data breach that exposed 4.1 million unique email addresses. The...
Anyone following the court case between Epic and Apple is undoubtedly already aware of the “bombshell” dropped by Apple’s Craig...
In the Android Security Bulletin of May 2021, published at the beginning of this month, you can find a list...
“It’s cracking, the whole thing.” The words were delivered quickly, but in a thoughtful and measured way. As if the...
Creator of Ethereum, crypto millionaire Vitalik Buterin destroyed more than 410 trillion Shiba tokens, the total value of which CoinDesk...
Threat actors are now using MountLocker ransomware via ‘Windows Active Directory enterprise APIs’ to target website developers and organizations. MountLocker...
Secrets must be kept confidential in order for networks to be protected and supply-chain attacks to be avoided. Malicious actors...