Currently, there is no evidence that this particular Azure vulnerability was exploited to gain unauthorized access to customer data. In its newest blog...
Endpoint security threats are usually targeted towards corporate organizations but can often use private individuals to get inside these companies – Let’s...
ProtonMail is being criticized for sharing French activist’s IP address with Swiss authorities while claiming it does not save logs. End-to-end encrypted...
S.O.V.A. Android banking trojan is actively being advertised on Russian hacker and cybercrime forums. In early August 2021, ThreatFabric’s team of researchers...
The Whitehat hacker and IT security researcher Marcus Hutchins, who saved the world from the WannaCry ransomware attack, has shared simple yet...
Originally, O.MG Cable was introduced in 2019. In 2019, at DEFCON, an IT security researcher going by the online handle of MG...
So far, the ongoing phishing attack has utilized more than 350 unique domains to target Microsoft Office 365 users. Microsoft has warned about...
According to researchers, “This is the worst cloud vulnerability you can imagine.” A critical security vulnerability present in Microsoft’s Azure cloud computing...
According to researchers, the incident involved 47 government and private entities across the United States. The IT security researchers at UpGuard published...
Braun Patched Faulty IV Pump After McAfee Discovered Vulnerability Allowing Medication Tampering. McAfee Enterprise’s Advanced Threat Research Team disclosed five unreported security...
Security vulnerabilities are inevitable but one can avoid them by securing applications. In this article, we are listing 5 popular WordPress security...
Microsoft was informed about the vulnerability by Google but the company claimed it to be a “non-issue” and that it “will not...
The hacker claims to have hacked T-Mobile’s production, development, and staging servers around two weeks back, including its Oracle database server. T-Mobile...
The fake 1Password installer is used to launch Cobalt Strike allowing attackers to collect information about multiple systems in the network. We...
Last year, we covered a research report which found out how projectors could be used to display virtual objects and fool self-driving...
The watchlist was exposed on a misconfigured server hosted on a Bahrain IP address instead of a US one. The FBI was...
The misconfigured S3 bucket was owned by SeniorAdvisor, a consumer ratings and reviews website. WizCase’s cybersecurity researchers discovered a misconfigured Amazon S3...
Threat actors used Google Ads to buy top slots on Google search engine to advertise fake Brave browser websites which delivered malware...
Most of the email addresses checked by researchers contained .gov suffixes or indicated that the user worked for New York Police Department....
The Elasticsearch database was left exposed without any security authentication which means it could have been accessed by anyone with access to...
According to the agency, the impact of these ransomware attacks can be devastating for both small to big businesses. The Federal Bureau...