hacking

Visit/security/ethical-hacking/356252/poorly-secured-banking-apps-lead-to-cyber-threats
ethical hacking

Mobile banking apps are exposing user data to attackers

Positive Technologies’ study finds 13 out of 14 banking apps gave attackers access to user data
26 Jun 2020
Visit/security/malware/356231/most-malware-came-through-https-connections-in-q1-2020
malware

Most malware came through HTTPS connections in Q1 2020

Signature-based antivirus protection would have been ineffective
25 Jun 2020
Visit/security/phishing/356211/phishing-attacks-target-unsuspecting-wells-fargo-customers
phishing

Phishing attacks target unsuspecting Wells Fargo customers

Over 15,000 Wells Fargo customers targeted in .ics phishing campaign
24 Jun 2020
Visit/security/hacking/356210/trump-administration-wants-to-enhance-the-security-of-gov-sites
hacking

Trump administration wants to enhance the security of .gov sites

The government hopes to strengthen defenses on all .gov sites to protect users
24 Jun 2020
Advertisement
Visit/security/ransomware/356186/maxlinear-targeted-by-maze-ransomware-attack
Ransomware splash screen mockup
ransomware

MaxLinear targeted by Maze ransomware attack

According to MaxLinear, threat actors gained unauthorized access to personal customer information
23 Jun 2020
Visit/technology/cryptocurrencies/356177/cybercriminals-use-elon-musks-name-in-a-giveaway-scam
Bitcoin cryptocurrency mining
cryptocurrencies

Cyber criminals use Elon Musk’s name in a giveaway scam

Cybercriminals used name-dropping Bitcoin vanity addresses to steal $2 million in two months
22 Jun 2020
Visit/security/hacking/356152/searching-for-a-new-job-that-linkedin-job-offer-may-be-fake
LinkedIn on a mobile device
hacking

Searching for a new job? That LinkedIn job offer may be fake

Threat actors use fake job offers to dupe their victims in this attack
19 Jun 2020
Visit/security/hacking/356130/savvy-threat-actors-can-recover-conversations-using-lightbulbs
hacking

Savvy threat actors can recover conversations using lightbulbs

Lightbulb eavesdropping doesn’t even require a smart bulb
18 Jun 2020
Advertisement
Visit/security/ransomware/356057/city-of-knoxville-faced-with-ransomware-attack
hacking and ransomware
ransomware

City of Knoxville faced with ransomware attack

City officials working with law enforcement to address the breach
12 Jun 2020
Visit/security/ransomware/355985/maze-ransomware-targets-numerous-high-profile-organizations
ransomware

Maze ransomware targets numerous high-profile organizations

VT San Antonio Aerospace and Westech International among Maze ransomware’s victims
9 Jun 2020
Advertisement
Visit/security/hacking/355965/check-point-software-of-resume-themed-malware
hacking

Check Point warns of resume-themed malware threat

Security firm claims resume-themed campaigns have doubled in the US in the past two months
8 Jun 2020
Visit/security/ransomware/355964/watch-out-for-fake-ransomware-decryption-tools
ransomware

Fake ransomware decryption tool double-encrypts user files

STOP Djvu decryptor encrypts a ransomware victim’s files with more ransomware
8 Jun 2020
Visit/security/data-breaches/355962/fitness-depot-notifies-customers-of-data-breach
data breaches

Fitness Depot notifies customers of data breach

The fitness retailer has said its ISP was to blame for a breach of its online store
8 Jun 2020
Visit/security/phishing/355936/inky-announces-20m-series-b-funding-round
phishing

INKY announces $20M Series B funding round

Insight Partners brings total investment in the startup to $31.6M
4 Jun 2020
Advertisement
Visit/security/ransomware/355909/microsoft-issues-warning-about-new-ponyfinal-ransomware-attacks
Ransomware splash screen mockup
ransomware

Microsoft issues warning about new PonyFinal ransomware attacks

PonyFinal attackers “looking for targets of opportunity," says Misner
3 Jun 2020
Visit/security/data-breaches/355908/amtrak-guest-reward-suffers-a-data-breach
data breaches

Amtrak Guest Reward suffers a data breach

Amtrak discloses unauthorized third-party access to Amtrak Guest Rewards accounts
3 Jun 2020
Visit/security/cyber-security/355903/brand-impersonation-and-form-based-attacks-are-rising
Hacking on keyboard
cyber security

Brand-impersonation and form-based attacks are rising

Google sites alone accounted for 65% of all form-based attacks between January and April
3 Jun 2020
Visit/security/ethical-hacking/355860/developer-scores-100000-bounty-from-apple-for-exposing-a-critical
ethical hacking

Developer scores $100,000 bounty from Apple for exposing a critical vulnerability

Apple ID bug would allow hackers to take control of a user’s account
1 Jun 2020
Visit/security/hacking/355854/hackers-wreaking-havoc-on-googles-cloud-infrastructure
hacking

Hackers are wreaking havoc on Google’s Cloud infrastructure

Attackers use Google Firebase storage URLs to trick users into giving up their login credentials
1 Jun 2020
Visit/security/phishing/355810/zloader-malware-returns-as-a-coronavirus-phishing-scam
Data on screen, viewed by shadowy hacker
phishing

ZLoader malware returns as a coronavirus phishing scam

Hackers have used ZLoader in 100 email campaigns in 2020
27 May 2020
Advertisement
Visit/security/hacking/355806/anarchygrabber-hack-steals-discord-tokens-ids-and-passwords
hacking

AnarchyGrabber hack steals Discord tokens, IDs and passwords

New trojan software corrupts Discord’s JavaScript files to get your private data
27 May 2020
Visit/security/hacking/355801/scammers-using-coronavirus-contact-tracing-in-hacking-attempt
hacking

Scammers leverage contact-tracing in hacking attempt

Savvy scammers use contract tracing texts to dupe users into handing over personal information
27 May 2020
Visit/security/phishing/355793/gitlab-phishes-its-remote-employees-and-1-in-5-fell-for-it
phishing

GitLab phished its employees and 20% handed over credentials

The exercise was designed to test the susceptibility of GitLab's remote workforce
26 May 2020