Security

New Zealand launches data breach notification tool

New Zealand launches data breach notification tool

NotifyUs will enable data handlers to check whether it is mandatory to report a...

U.S. Spy Agency Warns Beijing's Hackers Aiming at U.S. Defense Industry, Military

U.S. Spy Agency Warns Beijing's Hackers Aiming at U.S....

The NSA warned that Chinese government hackers were taking aim at U.S. networks...

MMO Game Street Mobster Leaks 1.9 million Users’ Data Due to Critical Vulnerability

MMO Game Street Mobster Leaks 1.9 million Users’ Data Due...

The SQL injection vulnerability in Street Mobster impacted the players’ usernames,...

Ransomware gang donates part of ransom demands to charity...

A ransomware gang has donated a part of the ransom demands it extorted from victims...

Cybersecurity intelligence firm 4iQ raises $30M in new funding round

Cybersecurity intelligence firm 4iQ raises $30M in new...

The cyber intelligence startup 4iQ said it’s planning to ramp up its investment...

Lawsuit accuses Indian hackers of leaking businessman's emails

Lawsuit accuses Indian hackers of leaking businessman's...

Iranian-American businessman Farhad Azima has accused a pair of Indian companies...

Apple Safari, Opera, UCWeb, and Other Mobile Browsers Affected by Address Bar Spoofing Attacks

Apple Safari, Opera, UCWeb, and Other Mobile Browsers Affected...

With the address bar being the only and last line of defense on mobile browsers,...

Zero-trust implementation begins with choosing an on-ramp

Zero-trust implementation begins with choosing an on-ramp

Zero-trust security has three main on-ramps -- each with its own technology path....

Stop the IT Blame Game

Stop the IT Blame Game

The cross-section of networks, cybersecurity, and applications existing in the cloud,...

Anti-stalkerware group aims to gather more data to help domestic violence victims

Anti-stalkerware group aims to gather more data to help...

Security firms, victim advocacy groups, and anti-domestic abuse organizations combined...

Instagram's Handling of Children's Data Under Investigation

Instagram's alleged data mishandling allowed the email addresses and phone numbers...

Google’s Waze Can Allow Hackers to Identify and Track Users

Google’s Waze Can Allow Hackers to Identify and Track Users

A security researcher has discovered a vulnerability in Google’s Waze app that can...

UK Government Claims Russian Hackers Were Preparing Cyberattacks...

Russian activity involved reconnaissance operations, as per the UK NCSC. Targets...

Is poor cyber hygiene crippling your security program?

Is poor cyber hygiene crippling your security program?

Faced with business continuity challenges, many companies failed to put all the...

Nefilim Ransomware Gang Leaks Data Stolen From Eyewear Giant Luxottica

Nefilim Ransomware Gang Leaks Data Stolen From Eyewear...

On September 18, the company was hit by a cyberattack, some of the websites operated...

SecOps teams turn to next-gen automation tools to address security gaps

SecOps teams turn to next-gen automation tools to address...

SOCs are most concerned with advanced threat detection and are increasingly looking...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.