WhatsApp Hit with €5.5 Million Fine for Violating Data Protection Laws
Jan 20, 2023Ravie LakshmananData Protection / Privacy
The Irish Data Protection Commission (DPC) on Thursday imposed fresh fines of €5.5 million against Meta's WhatsApp...
Roaming Mantis Spreading Mobile Malware That Hijacks Wi-Fi Routers’ DNS Settings
Jan 20, 2023Ravie LakshmananNetwork Security / Mobile Hacking
Threat actors associated with the Roaming Mantis attack campaign have been observed delivering an updated variant...
Hackers Steal Data from KFC, Pizza Hut, Taco Bell
A ransomware attack targeted Yum! Brands on January 18, 2023, caused the closure of 300 locations of its fast food chains KFC, Pizza Hut,...
Gamaredon Group Launches Cyberattacks Against Ukraine Using Telegram
Jan 20, 2023Ravie LakshmananCyber War / Cyber Attack
The Russian state-sponsored cyber espionage group known as Gamaredon has continued its digital onslaught against Ukraine,...
T-Mobile Hacked – Over 37 Million Customer Data Exposed
T-Mobile US, Inc. discovered that a malicious attacker was illegally accessing data through a single Application Programming Interface (“API”).
The research revealed that the threat...
Chinese Hackers Exploited Recent Fortinet Flaw as 0-Day to Drop Malware
Jan 20, 2023Ravie LakshmananFirewall / Network Security
A suspected China-nexus threat actor exploited a recently patched vulnerability in Fortinet FortiOS SSL-VPN as a zero-day...
10 Best Deep Web Search Engine alternative to Google for 2023
A Deep Web Search Engine is an alternative search engine when we need to search for something, then Google or Bing will be...
6 Types of Risk Assessment Methodologies + How to Choose
An organization's sensitive information is under constant threat. Identifying those security risks is critical to protecting that information. But some risks are bigger...
New Research Delves into the World of Malicious LNK Files and Hackers Behind Them
Jan 19, 2023Ravie LakshmananThreat Intelligence / Malware
Cybercriminals are increasingly leveraging malicious LNK files as an initial access method to download and execute payloads...
Common Browser Security Vulnerabilities Used By Hackers To Take Over Browser – GBHackers –...
While using web browsers, there are security threats that, if not careful, can allow cybercriminals to take over the browser and steal information.
To ensure...











