Hackers blackmail Globe Life after stealing customer data
Insurance giant Globe Life says an unknown threat actor attempted to extort money in exchange for not publishing data stolen […]
Insurance giant Globe Life says an unknown threat actor attempted to extort money in exchange for not publishing data stolen […]
The U.S. government on Wednesday announced the arrest and charging of two Sudanese brothers accused of running Anonymous Sudan (a.k.a.
Learn about 5 powerful cloud security automations with Blink Ops to simplify security operations like S3 bucket monitoring, subdomain takeover
Cybersecurity researchers have gleaned additional insights into a nascent ransomware-as-a-service (RaaS) called Cicada3301 after successfully gaining access to the group’s
Hono is a fast, lightweight web framework that runs anywhere JavaScript does, built with Web Standards. Of course, it runs
Today, the Biden-Harris Administration announced that the Department of Commerce and Infinera have signed a non-binding preliminary memorandum of terms
Law enforcement agencies have reported a rise in sextortion scams targeting teens across online platforms. Source:: BBC News – Technology
Deepak Jain, CEO of a Maryland-based IT services firm, has been indicted for fraud and making false statements after allegedly
An advanced persistent threat (APT) actor with suspected ties to India has sprung forth with a flurry of attacks against
On May 18, 2024, Kaspersky’s Global Research & Analysis Team (GReAT), with the help of its partners, held the qualifying
Federal prosecutors in the U.S. have charged two Sudanese brothers with running a distributed denial-of-service (DDoS) botnet for hire that
A critical security flaw has been disclosed in the Kubernetes Image Builder that, if successfully exploited, could be abused to
Ofcom warns social media companies could face fines if they don’t comply with the new Online Safety Bill Source:: BBC
New rule requires businesses to make subscribing and cancelling subscriptions equally simple. Source:: BBC News – Technology
Iranian hackers are breaching critical infrastructure organizations to collect credentials and network data that can be sold on cybercriminal forums
We all use messaging apps such as Whatsapp for free, but what’s in it for them? Source:: BBC News –
A vulnerability in the web-based management interface of Cisco Unified Contact Center Management Portal (Unified CCMP) could allow an unauthenticated,
A vulnerability in the backup feature of Cisco UCS Central Software could allow an attacker with access to a backup
Multiple vulnerabilities in Cisco ATA 190 Series Analog Telephone Adapter firmware, both on-premises and multiplatform, could allow a remote attacker
Mandiant security analysts warn of a worrying new trend of threat actors demonstrating a better capability to discover and exploit