Google Authenticator App now supports Google Account synchronization

3 years ago

Google announced that its Authenticator app for Android and iOS now supports Google Account synchronization. Google announced that its Google…

Peugeot leaks access to user information in South America

3 years ago

Peugeot, a French brand of automobiles owned by Stellantis, exposed its users in Peru, a South American country with a…

North Korea-linked BlueNoroff APT is behind the new RustBucket Mac Malware

3 years ago

North Korea-linked APT group BlueNoroff (aka Lazarus) was spotted targeting Mac users with new RustBucket malware. Researchers from security firm…

AuKill tool uses BYOVD attack to disable EDR software

3 years ago

Ransomware operators use the AuKill tool to disable EDR software through Bring Your Own Vulnerable Driver (BYOVD) attack. Sophos researchers…

Experts released PoC Exploit code for actively exploited PaperCut flaw

3 years ago

Threat actors are exploiting PaperCut MF/NG print management software flaws in attacks in the wild, while researchers released PoC exploit…

EvilExtractor, a new All-in-One info stealer appeared on the Dark Web

3 years ago

EvilExtractor is a new "all-in-one" info stealer for Windows that is being advertised for sale on dark web cybercrime forums.…

Russian cybercrime group likely behind ongoing exploitation of PaperCut flaws

3 years ago

Print management software provider PaperCut confirmed ongoing active exploitation of CVE-2023-27350 vulnerability. On April 19th, Print management software provider PaperCut confirmed…

Hackers can hack organizations using data found on their discarded enterprise network equipment

3 years ago

ESET researchers explained that enterprise network equipment that was discarded, but not destroyed, could reveal corporate secrets. ESET researchers purchased…

Health insurer Point32Health suffered a ransomware attack

3 years ago

Non-profit health insurer Point32Health suffered a ransomware attack and has taken systems offline in response to the incident. Non-profit health…

Experts spotted first-ever crypto mining campaign leveraging Kubernetes RBAC

3 years ago

Experts warn of a large-scale cryptocurrency mining campaign exploiting Kubernetes (K8s) Role-Based Access Control (RBAC). Cloud security firm Aqua discovered…

This website uses cookies.