Backconnect proxies – your last hope of online privacy.
We hate to break it to you, but almost everything you post online is being watched. It doesn’t matter if your accounts are set to private – once you postRead More →
We hate to break it to you, but almost everything you post online is being watched. It doesn’t matter if your accounts are set to private – once you postRead More →
After more than half a year of security testing in the Mercedes-Benz source code, Tencent Security researchers found at least five critical flaws in the computer and entertainment systems ofRead More →
Opera’s security teams revealed detection of six critical vulnerabilities residing in Privoxy, the company’s open source proxy software. The developers of the popular Chromium-based browser began a series of blogRead More →
Health authorities in Ireland announced that patients who do not require urgent services will experience a “significant delay” in hospitals after a severe ransomware infection compromised all medical systems inRead More →
The U.S. government has received about 7,000 complaints from users who have lost more than $80 million USD in cryptocurrency investment scams since October 2020. This report issued by theRead More →
In its most recent report on trends in the ransomware world, security firm KrebsOnSecurity noted that all ransomware variants feature an integrated security device to prevent detection; according to experts,Read More →
A supply chain attack was recently confirmed in Codecov and would have hit multiple companies. One of the organizations impacted by this incident is Monday.com, which provides online workflow managementRead More →
Cybersecurity researchers have discovered that a new credit card theft malware has been implemented to bypass client-side detection on e-commerce sites running unsupported versions of Magento. The campaign has beenRead More →
Tech firm AMD issued a security guide to address two potential attacks against the Secure Encrypted Virtualization (SEV) solution, which keeps virtual machines protected from some attack variants. According toRead More →
A recent report by the Federal Bureau of Investigation (FBI) points to a Brazilian group operating a plan to defraud customers of digital platforms such as Uber, Lyft and DoorDash,Read More →
Axel Souchet, a security researcher who used to work for Microsoft, revealed the Proof of Concept (PoC) exploit code to abuse a critical Windows IIS server vulnerability. The vulnerability, trackedRead More →
Today’s businesses rely on computer systems and connectivity for almost all aspects of their operations. In turn, technology helps companies serve more customers, make better decisions, and work efficiently. WithoutRead More →
This week the Royal British Household released an ad to look for applicants for a vacancy as a cybersecurity engineer, with a salary of up to $60,000 USD for justRead More →
Last weekend a group associated with the developers of the DarkSide ransomware attacked Colonial Pipeline systems, which manages the most important U.S. pipelines. This attack has provoked strong responses fromRead More →
An emergency alert from enterprise security firm Rapid7 notes that its systems were affected during the recent cyberattack on Codecov’s supply chain, a tool for code test analysis. The companyRead More →
The last decade has seen the meteoric rise of cybercrime to become the world’s most expensive type of crime. This isn’t very surprising, given that data has surpassed oil toRead More →
Attacks on ATMs on the street have evolved in great steps, leaving behind the methods of physical engagement of these machines to reach attacks using technology and advanced hacking capabilities.Read More →
Recent years have seen the inexorable rise of cybercrime, and the coronavirus pandemic seems only to have accelerated this. At any time, enterprises and governments could be subject to attacksRead More →
If you’re not already familiar with the dangers of Advanced Persistent Threats (APTs), then now is probably the right time to educate yourself on this topic. Most people will haveRead More →
Security incidents sometimes transcend affected organizations, reaching levels of impact that IT security teams cannot foresee. This is the case with the data breach in BigBasket, which resulted in theRead More →