Financial Services Sector Rife with Hidden Tunnels
Attackers use the approach to look like legitimate traffic and hide data exfiltration in plain sight. READ MORE HERE…
Attackers use the approach to look like legitimate traffic and hide data exfiltration in plain sight. READ MORE HERE…
Researchers are warning of a new Netflix phishing scam that leads to sites with valid TLS certificates. READ MORE HERE…
This is the first evidence of the China-linked threat actor’s activity since hacked the U.K. government and military in 2017 (which wasn’t made public until 2018). READ MORE HERE…
The threat actors appear to be in a reconnaissance phase, which could be a prelude to a larger cyber-sabotage attack meant to destroy and paralyze infrastructure. READ MORE HERE…
Researchers were able to discover a way to hack the device in less than an hour. READ MORE HERE…
Researchers demonstrate how an encrypted macOS hard drive can still leak unprotected data via the operating system’s Finder and QuickLook feature. READ MORE HERE…
The IP cameras have a slew of bugs allowing bad actors to control them, add them to a botnet, or render them useless. READ MORE HERE…
In a David-and-Goliath moment, the 49-year-old librarian has won satisfaction in the wake of its head-spinningly massive 2017 data breach. READ MORE HERE…
World Cup travelers should leave their mobile phones, laptops and tablets behind. READ MORE HERE…
Researchers said over a dozen malicious docker images available on Docker Hub allowed hackers to earn $90,000 in cryptojacking profits. READ MORE HERE…