Google Introduces Passwordless Secure Sign-In with Passkeys for Google Accounts
May 03, 2023Ravie LakshmananPassword Security / Authentication
Almost five months after Google added support for passkeys to its Chrome browser, the tech giant has...
New BGP Protocol Flaws Let Attackers Trigger DoS Attacks
Forescout Vedere Labs recently highlighted the neglected BGP security aspect – software implementation vulnerabilities.FRRouting’s BGP message parsing vulnerabilities discovered by Forescout Vedere Labs could...
Download the eBook: What Does it Take to be a Full-Fledged Virtual CISO?
May 03, 2023The Hacker NewsCISO / Cybersecurity
Almost half of MSP clients fell victim to a cyberattack within the last 12 months. In the...
Hackers Exploiting 5-year-old Unpatched Vulnerability in TBK DVR Devices
May 03, 2023Ravie LakshmananSurveillance / Vulnerability
Threat actors are actively exploiting an unpatched five-year-old flaw impacting TBK digital video recording (DVR) devices, according to...
T-Mobile Hacked – Attackers Accessed Over 37M Sensitive Data
T-Mobile recently confirmed another hack, the second this year and ninth since 2018, revealing customer data and account PINs.While T-Mobile confirmed a recent system...
CISA Issues Advisory on Critical RCE Affecting ME RTU Remote Terminal Units
May 03, 2023Ravie LakshmananICS/SCADA Security
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday released an Industrial Control Systems (ICS) advisory about a...
Why Telecoms Struggle with SaaS Security
The telecom industry has always been a tantalizing target for cybercriminals. The combination of interconnected networks, customer data, and sensitive information allows cybercriminals...
Android Device Migration Tools Let Hackers Steal App Data & Login
Smartphones are frequently replaced by users when newer versions of smartphones with much more features are released.The exchange of smartphones has a significant complication...
Researchers Uncover New BGP Flaws in Popular Internet Routing Protocol Software
May 02, 2023Ravie LakshmananNetwork Security / Vulnerability
Cybersecurity researchers have uncovered weaknesses in a software implementation of the Border Gateway Protocol (BGP) that could...
AresLoader Malware Attacking Citrix Users
Cyble Research and Intelligence Labs (CRIL) has recently detected AresLoader, a novel loader that is found to be disseminating numerous malware families.Malware loaders are...











