Hackers blackmail QuestionPro after alleged data theft _en.secnews.gr
| posted by rouiejay12 in : threats | No comments |
1

Stegomalware Surge – Attackers Using File, Video, Image & Others To Hide Malware _gbhackers.com
| posted by rouiejay12 in : threats | No comments |
1

7-Eleven stores in Denmark closed due to a cyberattack _bleepingcomputer.com
| posted by rouiejay12 in : attacks | No comments |
1

Simple IDOR vulnerability in Reddit allowed mischief-makers to perform mod actions _portswigger.net
| posted by rouiejay12 in : threats | No comments |
1

Microsoft fix for 'data damage' risk slowed performance _theregister.com
| posted by rouiejay12 in : patches | No comments |
1

Twilio discloses data breach that impacted customers & employees _securityaffairs.co
| posted by rouiejay12 in : attacks | No comments |
1

NSF Grants to Protect Data, User privacy _homelandsecuritynewswire.com
| posted by rouiejay12 in : research | No comments |
1

Email hack costs Salinas Valley Memorial Health $340K in breach settlement _scmagazine.com
| posted by rouiejay12 in : attacks | No comments |
1

Virtual Currency Platform ‘Tornado Cash’ Accused of Aiding APTs _threatpost.com
| posted by rouiejay12 in : government | No comments |
1

Slack admits to leaking hashed passwords for five years _nakedsecurity.sophos.com
| posted by rouiejay12 in : privacy | No comments |
1

New Orchard Botnet Uses Bitcoin Founder’s Account Info to Generate Malicious Domains _thehackernews.com
| posted by rouiejay12 in : threats | No comments |
1

US bans virtual currency mixer Tornado Cash _cybernews.com
| posted by rouiejay12 in : incident_response | No comments |
1

Weak Cybersecurity is taking a toll on Small Businesses _securityboulevard.com
| posted by rouiejay12 in : threats | No comments |
1

Cyberattacks on healthcare organizations negatively impact patient care _helpnetsecurity.com
| posted by rouiejay12 in : attacks | No comments |
1

HYAS Unveils New Tool for Continuous DNS Monitoring _securityweek.com
| posted by rouiejay12 in : products_and_services | No comments |
1

How to find out if you are involved in a data breach -- and what to do next _zdnet.com
| posted by rouiejay12 in : threats | No comments |
1

Ransomware, email compromise are top security threats, but deepfakes increase _csoonline.com
| posted by rouiejay12 in : threats | No comments |
1

Chinese Hackers May Be Behind Attacks Targeting Eastern Europe and Afghanistan _infosecurity-magazine.com
| posted by rouiejay12 in : attacks | No comments |
1

Attack on Supplier Leaves NHS Recovering Services _itsecurityguru.org
| posted by rouiejay12 in : attacks | No comments |
1

Deepfakes Grow in Sophistication, Cyberattacks Rise Following Ukraine War _darkreading.com
| posted by rouiejay12 in : attacks | No comments |
1

Germany: DIHK hit by 'massive' cyber attack _en.secnews.gr
| posted by rouiejay12 in : attacks | No comments |
1

Hackers Exploited Twitter Zero-day Bug to Expose 5.4 Million Accounts _gbhackers.com
| posted by rouiejay12 in : attacks | No comments |
1

Hackers are actively exploiting password-stealing flaw in Zimbra _bleepingcomputer.com
| posted by rouiejay12 in : attacks | No comments |
1

Chromium site isolation bypass allows wide range of attacks on browsers _portswigger.net
| posted by rouiejay12 in : attacks | No comments |
1

Iranian Hackers Likely Behind Disruptive Cyberattacks Against Albanian Government _thehackernews.com
| posted by rouiejay12 in : attacks | No comments |
1

Dark Utilities C2 service draws thousands of cyber criminals _theregister.com
| posted by rouiejay12 in : threats | No comments |
1

GwisinLocker ransomware exclusively targets South Korea _securityaffairs.co
| posted by rouiejay12 in : threats | No comments |
1

Banking trojan finds new routes to accounts by infiltrating Google Play Store _scmagazine.com
| posted by rouiejay12 in : threats | No comments |
1

Open Redirect Flaw Snags Amex, Snapchat User Data _threatpost.com
| posted by rouiejay12 in : attacks | No comments |
1

Sensitive records of over 280m Indian citizens exposed _cybernews.com
| posted by rouiejay12 in : attacks | No comments |
1

Universities are at risk of email-based impersonation attacks _helpnetsecurity.com
| posted by rouiejay12 in : attacks | No comments |
1

Meta’s threat report highlights clumsy attempt to manipulate Ukraine discourse _techcrunch.com
| posted by rouiejay12 in : threats | No comments |
1

SMBs Exposed to Attacks by Critical Vulnerability in DrayTek Vigor Routers _securityweek.com
| posted by rouiejay12 in : attacks | No comments |
1

Hackers Exploit Atlassian Confluence Vulnerability to Deploy New 'Ljl' Backdoor _infosecurity-magazine.com
| posted by rouiejay12 in : attacks | No comments |
1

Conservative Party Leadership Election Warned of Potentially Malicious Efforts to Alter the Result of Upcoming Election _itsecurityguru.org
| posted by rouiejay12 in : threats | No comments |
1

Cyberattackers Increasingly Target Cloud IAM as a Weak Link _darkreading.com
| posted by rouiejay12 in : attacks | No comments |
1

DHS Alerts of Critical Vulnerabilities in EAS Devices _heimdalsecurity.com
| posted by rouiejay12 in : incident_response | No comments |
1

Fake Atomic Wallet site pushes Mars Stealer malware _en.secnews.gr
| posted by rouiejay12 in : threats | No comments |
1

Multiple Vulnerabilities on VMware Let Attackers Gain Admin Privileges _gbhackers.com
| posted by rouiejay12 in : threats | No comments |
1

German Chambers of Industry and Commerce hit by 'massive' cyberattack _bleepingcomputer.com
| posted by rouiejay12 in : attacks | No comments |
1