Hacker Behind Optus Breach Releases 10,200 Customer Records in Extortion Scheme

0
The Australian Federal Police (AFP) on Monday disclosed it's working to gather "crucial evidence" and that it's collaborating with overseas law enforcement authorities following...

New Go-based Malware Attack Windows & Linux Systems

0
The cybersecurity researchers at Lumen’s Black Lotus Labs asserted that in order to mine crypto-currencies and launch DDoS attacks, hackers are deploying an existing...

Hackers Deliver Erbium Password-Stealing Malware

0
Several popular video games are now being infected with the brand new Erbium malware, which steals personal and sensitive information. The spread of this malware...

Chrome 106 Released – Google Fixed Several Security Bugs

0
The Chrome web browser was recently updated to a new stable version released by Google. Google Chrome’s updated version Chrome 106 offers a number...

LastPass Admits to Severe Data Breach, Encrypted Password Vaults Stolen

0
Dec 23, 2022Ravie LakshmananPassword Management / Data Breach The August 2022 security breach of LastPass may have been more severe than previously disclosed by...

Amazon unveils a Ring security camera with radar, and a new panic button

0
As part of its September 2022 Amazon event, the retail giant has unveiled three new Ring devices: the Spotlight Cam Pro, the Spotlight Cam...

Experts Uncover 85 Apps with 13 Million Downloads Involved in Ad Fraud Scheme

0
  As many as 75 apps on Google Play and 10 on Apple App Store have been discovered engaging in ad fraud as part of...

New NullMixer Malware Campaign Stealing Users’ Payment Data and Credentials

0
  Cybercriminals are continuing to prey on users searching for cracked software by directing them to fraudulent websites hosting weaponized installers that deploy malware called...

Why Continuous Security Testing is a Must for Organizations Today

0
The global cybersecurity market is flourishing. Experts at Gartner predict that the end-user spending for the information security and risk management market will grow...

Should You Use a VPN for Online Security? 4 Types of Malware and How...

0
A VPN creates an encrypted tunnel between your device and the VPN server. All of your data transmissions are protected by the VPN’s encrypted...