News

  • Two Additional Malicious Python Libraries Found on PyPI Repository

    PRIVACY PRIVACY The new packages were masquerading as one of the most popular open-source packages on PyPI Read More

    Read More

  • Healthcare Provider Issues Warning After Tracking Pixels Leak Patient Data

    PRIVACY PRIVACY The leak was caused by incorrect configurations of an online tracking tool from Meta Read More

    Read More

  • New Attack Weaponizes PLCs to Hack Enterprise and OT Networks

    PRIVACY PRIVACY The research resulted in proof-of-concept exploits against seven market-leading automation firms Read More

    Read More

  • #DEFCON: Electrovolt Exploits Against Electron Desktop Apps Exposed

    PRIVACY PRIVACY Electron-based desktop application including Discord, Microsoft Teams and VScode were at risk from a series of vulnerabilities Read More

    Read More

  • #DEFCON: How US Teen RickRolled His High School District

    PRIVACY PRIVACY American teenager explains how he was able to hack his local high school district Read More

    Read More

  • Ransomware Preparedness: Why Organizations Should Plan for Ransomware Attacks Like Disasters

    PRIVACY PRIVACY Ransomware Preparedness: Why Organizations Should Plan for Ransomware Like Disasters As ransomware has cemented itself as one of the biggest cybersecurity threats to companies around the globe, it has become increasingly important that organizations treat ransomware attacks like they would a natural disaster and establish a robust preparedness plan. Background In 2020, Chris…

    Read More

  • Safe Security debuts two free risk assessment tools for businesses

    PRIVACY PRIVACY Cybersecurity risk assessment company Safe Security on Tuesday rolled out two new online risk assessment tools for businesses to use, in order to help them understand their vulnerability to cyberattacks and the costs of insuring against them. Both tools—an interactive cost calculator for cyberattacks and a cyberinsurance assessment app—are available as free-to-use web…

    Read More

  • Remotely Controlling Touchscreens

    PRIVACY PRIVACY This is more of a demonstration than a real-world vulnerability, but researchers can use electromagnetic interference to remotely control touchscreens. From a news article: It’s important to note that the attack has a few key limitations. Firstly, the hackers need to know the target’s phone passcode, or launch the attack while the phone…

    Read More

  • Exposed VNC instances threatens critical infrastructure as attacks spike

    PRIVACY PRIVACY New research from threat intelligence and cybersecurity company Cyble has identified a peak in attacks targeting virtual network computing (VNC) – a graphical desktop-sharing system that uses the Remote Frame Buffer (RFB) protocol to control another machine remotely – in critical infrastructure sectors. By analyzing the data from its Global Sensor Intelligence (CGSI),…

    Read More

  • Hybrid Vishing Attacks Soar 625% in Q2

    PRIVACY PRIVACY Agari warns of multi-stage phishing threat Read More

    Read More

News, Advisories and much more

Exit mobile version