Cyber Attack

How To Optimize and Modernize Threat Exposure Management

Many will likely think that the answer to this question is a no-brainer. After all, reminders about preparing for cyberattacks…

2 years ago

Deep Insert – An ATM Skimmer Let Hackers Clone ATM Card & Steal 4-Digit PIN

It has been reported that in New York City a number of financial institutions are facing an outburst of super-thin…

2 years ago

Global Scam-as-a-service Operation “Classiscam” Target Users to Steal Payment Data

The cybersecurity firm Group-IB, one of the world's most prominent companies, has identified Classiscam as a potential threat. This recent…

3 years ago

Hackers Use Open Redirect Vulnerabilities in Online Services to Deliver Phishing Content

Researchers at Resecurity noticed threat actors leveraging Open Redirect Vulnerabilities which is popular in online services and apps to evade…

3 years ago

T-Mobile Decides To Settle $350 Million For Massive 2021 Data Breach

A class-action lawsuit brought by a group of customers against T-Mobile relating to the 2021 hack has been settled for…

3 years ago

Hackers Steal $540 Million From Axie Infinity Using a Fake Job Offer on LinkedIn

During the month of March 2022, one of Axie Infinity's former employees became the victim of a fake job offer…

3 years ago

Vulnerability in Honda Cars Let Hackers Unlock & Start Remotely

In nearly all Honda models, hackers were able to open the doors and start the car remotely. A remote keyless…

3 years ago

Marriott Hacked – Over 20 GB of Data Including Credit Card Leaked

Marriott Hotels & Resorts International based in Bethesda, Maryland suffered a data breach. An unnamed hacking group claimed to have…

3 years ago

Kids and Teens Forming Hacking Groups Online to Exchange Malware

Avast has revealed an online community creating, exchanging, and spreading malware on the popular communication platform Discord. Discord is a…

3 years ago

Hackers Used Mitel Zero-Day Flaw To Target VOIP Appliances

On Linux-based Mitel MiVoice VOIP appliances, hackers have used zero-day exploits to hack into the systems. These attempts appear to…

3 years ago