A recently patched vulnerability in iOS has been unpatched accidentally in the newly available update that leads to a jailbreak. After fixing a vulnerability in…
The attack affected websites from the U.S., U.K., New Zealand, and South Africa.
Biostar’s clients include banks, government agencies, and the UK Metropolitan Police.
A white-hat hacker from Google detailed a 20-year-old windows vulnerability that remained unpatched up until now.
Is it poetic justice being served?
The study came out a few days after Microsoft warned companies that Russian hackers are using VoIP phones to infiltrate corporate networks.
Android phones from small-time smartphone manufacturers are more likely to fall victim to preinstalled malware and exploitation in Android’s open-source system than major phone manufacturers…
Amid the growing threat of homegrown terrorism, the Federal Bureau of Investigation (FBI) is now actively looking for technologies and bidders who can offer them…
A vulnerability that is affecting Windows computer running on 64-bit Intel and AMD processors could possibly be attacked, letting the attackers access and gain information…
Half of the destructive malware incidents assisted by IBM’s X-Force Iris incident response team are companies in the manufacturing industry.
A researcher claims to discover Honda’s ElasticSearch database that exposes the internal system and device data. The discovery revealed a database containing 40GB of internal…
The prevalence of Android ransomware is back as announced by a group of cybersecurity researchers who discovered that a new family of ransomware is circulating…
Another day, another company recklessly exposed their database for everyone with the link can see online. This time, it is the Indian productivity tool, Formget….
For only $6, you can now purchase a hacked Deliveroo account from the dark web, which you can use to order food from different establishments…
The Bulgarian police are investigating last week’s attack on the country’s tax systems. The suspect — who’s already in custody — is a member of…
Cybersecurity researchers have warned users of the popular multimedia player, VLC, of a “critical” vulnerability that could expose them to potential risks once exploited by…
The hackers gained access to students’ and applicants’ names, addresses, phone numbers, ID information, and emai addresses. They were reportedly used to send fraudulent invoices to victims.
The threat actors are using LinkedIn to send malicious documents.
The credit reporting company has finally settled a deal with the Federal Trade Commission.
Adware may not attempt to steal our money, but they use us to fake numbers for advertisers to pay them more.
The data was being sold by the online analytics company “Nacho Analytics.”
Much like the Greek god, Morpheus chip is a hacker’s nightmare.
Within the last few months, a malvertiser has been pushing malicious tech support scam ads to users of Outlook, and other Microsoft owned apps in…
The data appears to come from more than 100 loan-related apps and exposing a handful of sensitive data that researchers think caused by the problematic security of Chinese Fintech industry.
Hackers used the Samsung website to gain access to Sprint’s accounts.
Eleven gigabytes of data were extracted in 57 databases from Bulgaria’s National Revenue Agency.
The vulnerability, if not patched, could allow hackers to take over Instagram accounts in 10 minutes.
The vulnerability is dubbed as “Media File Jacking.”
A malware that has existed since 2016 has been noticed once more; this time, the researchers who discovered the malware said that it has evolved…
Tech experts believe it was “irresponsible.”
They’re not even sure when they knew about the incident.
They are looking for Islam-related files.
We talked with Orvibo and the researchers who discovered the open database, both parties confirmed fixes.
It evaded the public eye for two years.
As exact as latitude and longitude coordinates.
But the company said their customers were barely impacted by the breach.
[bctt tweet=”Nine states have updated their data breach notification laws to expand the definition of a data breach and to prescribe a timeline for companies to notify victims of the data breach.” username=”Z6Mag”]
Medtronic MiniMed recalls some of its insulin pumps after the US Food and Drug Administration warned the company that some of its products are vulnerable…
Cybersecurity experts in three different separate research have confirmed the existence of a new surveillance tool used by Chinese police to spy on their citizen,…
Operation Soft Cell has been operating since 2012.
It runs through an app impersonating a Turkish crypto exchange app.
The U.S. Cyber Command, with the green light from President Trump, launched a cyber attack against Iran’s missile launching systems.
Walmart’s AI-based program can detect if an item does not go through the register. It’s proven to lessen shoplifting.
Another day, another zero-day.
[bctt tweet=”With an off-the-rack hardware and an open source software, hackers can exploit LTE vulnerabilities to send fake presidential alerts.” username=”Z6Mag”]
Dating apps have been growing in popularity, especially among millennials, but it appears that with a new study, dating apps aren’t just building new relationships;…
The employee with “ill-intention” is now fired.
[bctt tweet=”Hackers used two Firefox zero-day vulnerabilities to launch attacks against Coinbase and other crypto companies two after they were reported.” username=”Z6Mag”]
[bctt tweet=”Florida city, Riviera Beach pays a ransom of nearly $600,000 to hackers as government transactions have faced delays and rebuilding computer systems are too costly” username=”Z6Mag”]
[bctt tweet=”Firefox browser have been updated to patch up a zero-day that has been exploited in the wild and they launched Enhanced Tracking Protection feature so sites won’t track users.” username=”Z6Mag”]
[bctt tweet=”Half of the growing cyber attacks in the Middle Easts, especially in the UAE, has targeted oil and gas companies, Dark Matter revealed.” username=”Z6Mag”]
[bctt tweet=”Experts warn that the series of ransomware attacks against US City and state agencies is a message that the government should listen to.” username=”Z6Mag”]
The new Houdini malware targets financial institutions and their customers.
[bctt tweet=”AMCA previously reported that there were only 200,000 victims in the recent breach, but their partner labs said there were more than 20 million.” username=”Z6Mag”]
[bctt tweet=”Telegram confirmed that the powerful DDoS attack came from IP addresses in China and is linked to the protests held in Hong Kong.” username=”Z6Mag”]
Uncle Sam is calling on you to display your patriotism, but it’s in a different way than you may imagine. A new kind of draft…