information security news

X will collect biometric data from its premium users

The social media site X announced that it will collect premium users' biometric data for security and identification purposes. The…

2 years ago

“Smishing Triad” Targeted USPS and US Citizens for Data Theft

Resecurity has identified a large-scale smishing campaign, tracked as Smishing Triad, targeting the US Citizens. Earlier episodes have revealed victims…

2 years ago

Publicly available Evil_MinIO exploit used in attacks on MinIO Storage Systems

A threat actor was spotted exploiting MinIO storage system vulnerabilities to execute arbitrary code on affected servers. Security Joes researchers…

2 years ago

University of Sydney suffered a security breach caused by a third-party service provider

The University of Sydney (USYD) suffered a security breach caused by a third-party service provider that exposed personal information of…

2 years ago

Cybercrime will cost Germany $224 billion in 2023

Cybercrime will cost Germany 206 billion euros ($224 billion) in 2023, German digital association Bitkom told Reuters. According to the…

2 years ago

PoC exploit code released for CVE-2023-34039 bug in VMware Aria Operations for Networks

Researcher released PoC exploit code for a recent critical flaw (CVE-2023-34039) in VMware Aria Operations for Networks. At the end…

2 years ago

Security Affairs newsletter Round 435 by Pierluigi Paganini – International edition

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…

2 years ago

LockBit ransomware gang hit the Commission des services electriques de Montréal (CSEM)

The LockBit ransomware gang claims to have breached the Commission des services electriques de Montréal (CSEM). The LockBit ransomware group…

2 years ago

Social engineering attacks target Okta customers to achieve a highly privileged role

Identity services provider Okta warned customers of social engineering attacks carried out by threat actors to obtain elevated administrator permissions.…

2 years ago

Talos wars of customizations of the open-source info stealer SapphireStealer

Cisco reported that multiple threat actors are customizing the SapphireStealer information stealer after the leak of its source code. Cisco…

2 years ago

This website uses cookies.