Pro Microsoft Power Apps misconfiguration exposes 38m records Sensitive data including contact tracing, vaccine status, names and e-mail addresses leaked 24 Aug
Pro Nokia subsidiary reveals data breach following Conti ransomware raid SAC Wireless notifies current and former employees that their personal information may be at risk 24 Aug
Pro US State Department reportedly suffers a cyber attack Details of the hack are still developing 23 Aug
Pro Blackberry ‘reluctantly’ admits to QNX flaw The vulnerability, known as BadAlloc, impacts pre-2012 versions of BlackBerry’s flagship operating system 18 Aug
Pro 83 million IoT devices at risk of hacking The vulnerability could enable threat actors to listen in on private conversations and watch live video streams 18 Aug
Pro T-Mobile confirms data breach The US operator has not yet determined if there is any personal customer data involved 17 Aug
Pro Hackers are using Morse code to bypass phishing controls JavaScript files were encoded in ASCII then in Morse to hide code 16 Aug
Pro T-Mobile investigates potential 100m user data breach A seller on an online forum claims to be in the possession of the data and is trying to sell it for six Bitcoin 16 Aug
Pro Poly Network offers $500k bug bounty reward to its own hacker The reward has been offered following the successful return of $610 million in stolen tokens 13 Aug
Pro Poly Network hacker returns $342m of stolen assets Hacker states that they are “not very interested in money” 12 Aug
Pro Hackers lift $610m in cryptocurrency from Poly Network The company has pleaded with the hackers to return the stolen tokens 11 Aug
Trade NortonLifeLock and Avast finalise $8bn merger The companies said the merger would create a ‘new, industry-leading cyber security business’ 11 Aug
Pro Cyber criminals leak 1m credit cards on the Dark Web Among the stolen hoard are customer details from US and Canadian banks 10 Aug
Pro DNS loophole could allow hackers to carry out “nation-state level spying” Sensitive data could be accessed from corporate networks using vulnerability 9 Aug
Pro Resentful hacker exposes Conti ransomware gang’s tools Tools leaked by disgruntled affiliate 9 Aug
Pro New phishing campaign lures victims with compromised SharePoint website The campaign was designed to go undetected by security products 6 Aug
Pro US agencies publish guidance on hardening Kubernetes following cyber attacks Supply chain risks, malicious attacks, and insider threats are the main causes of concern 4 Aug
Pro Data breach costs surge to record high in 2021 Healthcare breaches by far the most costly, says IBM Security report 29 Jul
Pro Dark Web ads offering access to corporate networks increase sevenfold New report shines a light on hackers offering “access for sale” to other cyber criminals 29 Jul
Pro Biden warns cyber attacks could lead to “shooting war” The comments come as the US continues to battle a wave of serious cyber attacks 28 Jul
Trade Microsoft acquires security start-up CloudKnox Firm continues to expand its security portfolio to secure its own cloud services 23 Jul
Pro Google Cloud beefs up security following surge in ransomware attacks Financial services, retail, and healthcare sectors have been especially vulnerable to ransomware attacks 21 Jul
Pro Microsoft cracks down on sophisticated BEC scam campaign The firm’s Digital Crime Unit seized a variety of malicious domains targeting Office 365 customers 20 Jul
Life Pegasus: Report finds spyware used to target journalists, activists NSO Group sold the surveillance tool to authoritarian governments, investigation finds 20 Jul
Life What is phishing? From banking scams to industrial espionage, we look at why phishing is so lucrative 20 Jul
Pro Cloudflare flaw could have led to series of supply-chain attacks Hackers were able to exploit a path traversal vulnerability to compromise CDNJS and target thousands of sites 19 Jul
Trade Avast and Norton in talks over multi-billion dollar merger The two competitors could join forces to become the biggest name in the consumer security market 15 Jul
Pro Interpol calls for more action to prevent ‘ransomware pandemic’ Secretary General Jürgen Stock calls for a global coalition to fight the growing number of attacks 14 Jul
Pro REvil vanishes from the Web without a trace The mysterious shutdown comes only days after the ransomware group’s massive Kaseya cyber attack hit at least 1,000 businesses 14 Jul
Pro Kaspersky Password Manager generates passwords that can be ‘cracked in seconds’ A now-patched vulnerability means specialised tools can game Kaspersky's method for creating passwords 8 Jul
Pro Russian Cozy Bear hackers reportedly attacked the Republican party The same hackers are thought to be behind the recent SolarWinds campaign and cyber espionage targeting Covid-19 vaccine development 8 Jul
Life Google shuts down Play Store apps for stealing Facebook credentials The nine malicious Android apps boast nearly 6m downloads collectively 5 Jul
Pro REvil demands $70m ransom after Kaseya supply chain attack The cyber gang claims it’s infected “more than a million systems” after exploiting a zero-day flaw in VSA 5 Jul
Pro US, UK security agencies warn against Russian ‘global brute force campaign’ APT28 is accused of targeting hundreds of government and private sector targets worldwide 2 Jul
Pro Diavol ransomware linked to Trickbot botnet Security researchers find links between Diavol malware and the Wizard Spider crime gang 2 Jul
Insights Threat awareness biggest security issue for companies Interim TechBeat results show continued frustration with employees 2 Jul
Life Western Digital to provide recovery services for hacked NAS drives Users affected by the cyber attack will be able to upgrade to a new My Cloud device 1 Jul
Life LinkedIn denies data breach that reportedly exposed 700m user records Report claims 'breach' led to profiles belonging to 92% of LinkedIn users being put up for sale on a popular hacker forum 30 Jun
Pro SolarWinds hackers breach Microsoft support agent to target customers Nobelium engaged in password spray and brute-force attacks after implanting malware on a device belonging to a Microsoft employee 28 Jun
Pro Atlassian patches One-Click flaw that allowed hackers to steal user sessions With the stolen session, the hacker could steal sensitive information 25 Jun
Subscribers 0
Fans 0
Followers 0
Followers