GitHub: Nearly 100,000 NPM Users’ credentials stolen in the April OAuth token attack
GitHub provided additional details into the theft of its integration OAuth tokens that occurred in April, with nearly 100,000 NPM users’ credentials.
Read moreNews
GitHub provided additional details into the theft of its integration OAuth tokens that occurred in April, with nearly 100,000 NPM users’ credentials.
Read moreIT threat evolution in Q1 2022 IT threat evolution in Q1 2022. Non-mobile statistics IT threat evolution in Q1 2022.
Read moreIT threat evolution in Q1 2022 IT threat evolution in Q1 2022. Non-mobile statistics IT threat evolution in Q1 2022.
Read moreIT threat evolution in Q1 2022 IT threat evolution in Q1 2022. Non-mobile statistics IT threat evolution in Q1 2022.
Read moreMicrosoft found several high-severity vulnerabilities in a mobile framework used in pre-installed Android System apps. The Microsoft 365 Defender Research
Read moreSecurity researchers devised a technique, dubbed GhostTouch, to remotely control touchscreens using electromagnetic signals. A team of researchers from Zhejiang
Read moreThe FBI warns organizations in the higher education sector of credentials sold on cybercrime forums that can allow threat actors
Read moreThe Federal Trade Commission (FTC) and the Department of Justice (DOJ) have ordered Twitter to pay a $150M penalty for
Read moreMozilla has published updates for two critical security issues in Firefox and Thunderbird, demonstrated during Pwn2Own Vancouver. The vulnerabilities, discovered
Read moreA new version of the ERMAC Android banking trojan is able to target an increased number of apps. The ERMAC
Read moreSecurity researchers released PoC exploit code for the critical authentication bypass vulnerability CVE-2022-22972 affecting multiple VMware products. Horizon3 security researchers
Read moreKaspersky Managed Detection and Response (MDR) helps organizations to complement existing detection capabilities or to expand limited in-house resources to
Read moreAndrea Berg, CIO of Arjo, explores the critical need for effective and inclusive communication around IT requirements to expand beyond
Read moreAn investigation of the infamous “Is That You?” video scam led Cybernews researchers into exposing threat actors who are poisoning
Read moreZyxel addressed multiple vulnerabilities impacting many of its products, including APs, AP controllers, and firewalls. Zyxel has released security updates
Read moreResearchers warn of a new malvertising campaign spreading the ChromeLoader malware that hijacks the victims’ browsers. Researchers from Red Canary
Read moreIf you’re on the hunt for cracked software or games, be warned. Rogue ISO archive files are looking to infect
Read moreThe maintainers of the Tails project (The Amnesic Incognito Live System) warn users that the Tor Browser bundled with the
Read moreA horrible catfishing scam is using real abuse photos in order to lure in unsuspecting victims on sites like Tinder
Read moreItaly announced its National Cybersecurity Strategy for 2022/26, a crucial document to address cyber threats and increase the resilience of
Read moreOur spam traps recently caught a phishing scam that neatly illustrates some of the tactics scammers use routinely to avoid
Read moreThe Verizon 2022 Data Breach Investigations Report is out. We are proud to collaborate as a supporting contributor to this
Read moreIntroduction The recent story about the 19-year-old hacker who took control of several dozen Tesla cars has become something of a
Read moreAn unknown APT group is targeting Russian government entities since the beginning of the Russian invasion of Ukraine. Researchers from
Read more