Over 75 Applications on Google Play with 13M Installations Deliver Adware
Researchers from HUMAN’s Satori Threat Intelligence team found a new adware operation named ‘Scylla’, which is the third wave of an attack reported in...
New NullMixer Malware Campaign Stealing Users’ Payment Data and Credentials
Cybercriminals are continuing to prey on users searching for cracked software by directing them to fraudulent websites hosting weaponized installers that deploy malware called...
Chrome 106 Released – Google Fixed Several Security Bugs
The Chrome web browser was recently updated to a new stable version released by Google. Google Chrome’s updated version Chrome 106 offers a number...
Hacker Behind Optus Breach Releases 10,200 Customer Records in Extortion Scheme
The Australian Federal Police (AFP) on Monday disclosed it's working to gather "crucial evidence" and that it's collaborating with overseas law enforcement authorities following...
Russia Plan a Massive Cyber Attack on Ukraine’s Infrastructure
There has been a warning recently issued by the Ukrainian military intelligence service about massive cyberattacks from Russia. As part of its plan to...
BIND DNS Software High-Severity Flaws Let Hackers Trigger the Attack
The ISC (Internet Systems Consortium) released a security patch this week in an attempt to address six vulnerabilities that could allow remote attackers to...
RCE Bug in ZOHO Products Let Hackers Execute Arbitrary Code Remotely
CISA’s bug catalog has been updated with a new vulnerability related to Java deserialization, which has been exploited in the wild by malicious threat...
What Stricter Data Privacy Laws Mean for Your Cybersecurity Policies
Dec 09, 2022The Hacker NewsData Protection / Privacy
For today's businesses data privacy is already a big headache, and with modern privacy laws expanding...
Amazon unveils a Ring security camera with radar, and a new panic button
As part of its September 2022 Amazon event, the retail giant has unveiled three new Ring devices: the Spotlight Cam Pro, the Spotlight Cam...
Should You Use a VPN for Online Security? 4 Types of Malware and How...
A VPN creates an encrypted tunnel between your device and the VPN server. All of your data transmissions are protected by the VPN’s encrypted...