Over 75 Applications on Google Play with 13M Installations Deliver Adware

0
Researchers from HUMAN’s Satori Threat Intelligence team found a new adware operation named ‘Scylla’, which is the third wave of an attack reported in...

New NullMixer Malware Campaign Stealing Users’ Payment Data and Credentials

0
  Cybercriminals are continuing to prey on users searching for cracked software by directing them to fraudulent websites hosting weaponized installers that deploy malware called...

Chrome 106 Released – Google Fixed Several Security Bugs

0
The Chrome web browser was recently updated to a new stable version released by Google. Google Chrome’s updated version Chrome 106 offers a number...

Hacker Behind Optus Breach Releases 10,200 Customer Records in Extortion Scheme

0
The Australian Federal Police (AFP) on Monday disclosed it's working to gather "crucial evidence" and that it's collaborating with overseas law enforcement authorities following...

Russia Plan a Massive Cyber Attack on Ukraine’s Infrastructure

0
There has been a warning recently issued by the Ukrainian military intelligence service about massive cyberattacks from Russia. As part of its plan to...

BIND DNS Software High-Severity Flaws Let Hackers Trigger the Attack

0
The ISC (Internet Systems Consortium) released a security patch this week in an attempt to address six vulnerabilities that could allow remote attackers to...

RCE Bug in ZOHO Products Let Hackers Execute Arbitrary Code Remotely

0
CISA’s bug catalog has been updated with a new vulnerability related to Java deserialization, which has been exploited in the wild by malicious threat...

What Stricter Data Privacy Laws Mean for Your Cybersecurity Policies

0
Dec 09, 2022The Hacker NewsData Protection / Privacy For today's businesses data privacy is already a big headache, and with modern privacy laws expanding...

Amazon unveils a Ring security camera with radar, and a new panic button

0
As part of its September 2022 Amazon event, the retail giant has unveiled three new Ring devices: the Spotlight Cam Pro, the Spotlight Cam...

Should You Use a VPN for Online Security? 4 Types of Malware and How...

0
A VPN creates an encrypted tunnel between your device and the VPN server. All of your data transmissions are protected by the VPN’s encrypted...