Security Analysis Clears TikTok of Censorship, Privacy Accusations
TikTok’s source code is in line with industry standards, security researchers say. [...]
TikTok’s source code is in line with industry standards, security researchers say. [...]
Derek Manky, Chief of Security Insights & Global Threat Alliances at Fortinet’s FortiGuard Labs, gives insight into the surge in attacks against vulnerable Microsoft Exchange servers over the last week. [...]
A previously undocumented password and cookie stealer has been compromising accounts of big guns like Facebook, Apple, Amazon and Google since 2019 and then using them for cybercriminal activity. [...]
The newly discovered steganography method could be exploited by threat actors to obscure nefarious activity inside photos hosted on the social-media platform. [...]
The ‘young mastermind’ of the Twitter hack will serve three years in juvenile detention. [...]
A new Mimecast update reveals the SolarWinds hackers accessed several "limited" source code repositories. [...]
A Florida high-school student faces jail time for rigging her school's Homecoming Queen election. [...]
Public proof-of-concept (PoC) exploits for ProxyLogon could be fanning a feeding frenzy of attacks even as patching makes progress. [...]
Researchers from Sucuri discovered the tactic, which creatively hides malicious activity until the info can be retrieved, during an investigation into a compromised Magento 2 e-commerce site. [...]
A year after COVID-19 was officially determined to be a pandemic, the methods and tactics used by cybercriminals have drastically changed. [...]
Sky ECC claims that cops cracked a fake version of the app being passed off by disgruntled reseller. [...]
The multinational brewing company did not say what type of incident caused a ‘systems outage,’ but it's investigating and working to get networks back online. [...]
At least 10 nation-state-backed groups are using the ProxyLogon exploit chain to compromise email servers, as compromises mount. [...]
Microsoft's regularly scheduled March Patch Tuesday updates address 89 CVEs overall. [...]
Despite an explosion in the sheer amount of stolen data available on the Dark Web, the value of personal information is holding steady, according to the 2021 Dark Web price index from Privacy Affairs. That leaves these thriving dirty data dealers in a familiar predicament — they need to lock …
A phishing attack targeting Microsoft users leverages a bogus Google reCAPTCHA system. [...]
Researchers with Microsoft and FireEye found three new malware families, which they said are used by the threat group behind the SolarWinds attack. [...]
Elite Russian forums for cybercriminals have been hacked in a string of breaches, leaving hackers edgy and worried about law enforcement. [...]
Cybercriminals are using the COVID-19 vaccine to steal Microsoft credentials, infect systems with malware and bilk victims out of hundreds of dollars. [...]
Wireless mouse-utility lacks proper authentication and opens Windows systems to attack. [...]
A third-party IT provider exposed valuable airline data that experts say could be a goldmine for cybercriminals. [...]
The Russian-speaking RTM threat group is targeting organizations in an ongoing campaign that leverages a well-known banking trojan, brand new ransomware strain and extortion tactics. [...]
Full dumps of email boxes, lateral movement and backdoors characterize sophisticated attacks by a Chinese APT - while more incidents spread like wildfire. [...]
The Fortune-500 hospital network owner is facing steep costs in damages after a cyberattack impacted patient care and billing in September and October. [...]
Emails spreading the ObliqueRAT malware now make use of steganography, disguising their payloads on compromised websites. [...]