Can Meta’s new VR headset stop me feeling sick?
The company’s new VR headset retails at $499 – but can Mark Zuckerberg stop it making me nauseous?...
Explainer: What Is Photogrammetry?
Photogrammetry is the process of capturing images and stitching them together to create a digital model of the...
Don’t Let Zombie Zoom Links Drag You Down
Many organizations — including quite a few Fortune 500 firms — have exposed web links that allow anyone...
Is that a hot iPhone 15 in your pocket, or… ?
Every year a new scare story appears soon after Apple introduces new iPhone models. It’s a regular occurrence,...
NIST Researchers Develop a Breakthrough COVID-19 Detection Technology
“Only connect” is the most famous line in the British novelist E. M. Forster’s writings. Forster was urging...
LUCR-3: Scattered Spider Getting SaaS-y in the Cloud
LUCR-3 overlaps with groups such as Scattered Spider, Oktapus, UNC3944, and STORM-0875 and is a financially motivated attacker...
APIs: Unveiling the Silent Killer of Cyber Security Risk Across Industries
Introduction In today’s interconnected digital ecosystem, Application Programming Interfaces (APIs) play a pivotal role in enabling seamless communication...
Silent Skimmer: A Year-Long Web Skimming Campaign Targeting Online Payment Businesses
A financially motivated campaign has been targeting online payment businesses in the Asia Pacific, North America, and Latin...
Why your new Apple iPhone 15 is overheating
The firm says a bug in its operating system and updates to apps like Instagram are behind the...
Tom Hanks warns dental plan ad image is AI fake
The actor says he is the latest celebrity to fall victim to a deepfake scam, and has “nothing...
The antitrust suit against Google isn’t the DOJ-Microsoft fight redux
For longtime tech industry watchers, the US Department of Justice’s antitrust suit against Google feels like déjà vu...
Will the FTC’s Lina Khan succeed in breaking up Amazon?
The FTC’s latest antitrust lawsuit accuses Amazon of using a web of anticompetitive strategies to maintain a monopoly,...
OpenRefine’s Zip Slip Vulnerability Could Let Attackers Execute Malicious Code
A high-severity security flaw has been disclosed in the open-source OpenRefine data cleanup and transformation tool that could...
BunnyLoader: New Malware-as-a-Service Threat Emerges in the Cybercrime Underground
Cybersecurity experts have discovered yet another malware-as-a-service (MaaS) threat called BunnyLoader that’s being advertised for sale on the cybercrime underground....
Zanubis Android Banking Trojan Poses as Peruvian Government App to Target Users
An emerging Android banking trojan called Zanubis is now masquerading as a Peruvian government app to trick unsuspecting...
The people going ‘monk mode’ to limit social media use
A growing number of individuals are using apps to block access to social media and the internet. Source::...
A Closer Look at the Snatch Data Ransom Group
Earlier this week, KrebsOnSecurity revealed that the darknet website for the Snatch ransomware group was leaking data about...
FBI Warns of Rising Trend of Dual Ransomware Attacks Targeting U.S. Companies
The U.S. Federal Bureau of Investigation (FBI) is warning of a new trend of dual ransomware attacks targeting...
Iranian APT Group OilRig Using New Menorah Malware for Covert Operations
Sophisticated cyber actors backed by Iran known as OilRig have been linked to a spear-phishing campaign that infects victims with...
New Critical Security Flaws Expose Exim Mail Servers to Remote Attacks
Multiple security vulnerabilities have been disclosed in the Exim mail transfer agent that, if successfully exploited, could result in information...