WhatsApp Hit with €5.5 Million Fine for Violating Data Protection Laws

0
Jan 20, 2023Ravie LakshmananData Protection / Privacy The Irish Data Protection Commission (DPC) on Thursday imposed fresh fines of €5.5 million against Meta's WhatsApp...

Roaming Mantis Spreading Mobile Malware That Hijacks Wi-Fi Routers’ DNS Settings

0
Jan 20, 2023Ravie LakshmananNetwork Security / Mobile Hacking Threat actors associated with the Roaming Mantis attack campaign have been observed delivering an updated variant...

Hackers Steal Data from  KFC, Pizza Hut, Taco Bell

0
A ransomware attack targeted Yum! Brands on January 18, 2023, caused the closure of 300 locations of its fast food chains KFC, Pizza Hut,...

Gamaredon Group Launches Cyberattacks Against Ukraine Using Telegram

0
Jan 20, 2023Ravie LakshmananCyber War / Cyber Attack The Russian state-sponsored cyber espionage group known as Gamaredon has continued its digital onslaught against Ukraine,...

T-Mobile Hacked – Over 37 Million Customer Data Exposed

0
T-Mobile US, Inc. discovered that a malicious attacker was illegally accessing data through a single Application Programming Interface (“API”). The research revealed that the threat...

Chinese Hackers Exploited Recent Fortinet Flaw as 0-Day to Drop Malware

0
Jan 20, 2023Ravie LakshmananFirewall / Network Security A suspected China-nexus threat actor exploited a recently patched vulnerability in Fortinet FortiOS SSL-VPN as a zero-day...

10 Best Deep Web Search Engine alternative to Google for 2023

0
A Deep Web Search Engine is an alternative search engine when we need to search for something, then Google or Bing will be...

6 Types of Risk Assessment Methodologies + How to Choose

0
An organization's sensitive information is under constant threat. Identifying those security risks is critical to protecting that information. But some risks are bigger...

New Research Delves into the World of Malicious LNK Files and Hackers Behind Them

0
Jan 19, 2023Ravie LakshmananThreat Intelligence / Malware Cybercriminals are increasingly leveraging malicious LNK files as an initial access method to download and execute payloads...

Common Browser Security Vulnerabilities Used By Hackers To Take Over Browser – GBHackers –...

0
While using web browsers, there are security threats that, if not careful, can allow cybercriminals to take over the browser and steal information. To ensure...