Security solutions are designed to keep an organization safe, but those models crumble when that same software becomes a threat vector for the attackers to exploit. Such is the case with a new Bitdefender remote code execution vulnerability, dubbed CVE-2020-8102, lurking in its Safepay browser component.
In what is being referred to as 'BlueLeaks,' a group called Distributed Denial of Secrets (DDoSecrets) has released a 269 GB data dump containing 24 years worth of records from over 200 police departments.
Threat actors trying to steal your credentials through phishing attackers is nothing new, and the number of campaigns has only been rising in recent times.
Rumors began circulating on Twitter yesterday that the U.S. was under a massive DDoS attack. It turns out T-it was caused by a problem with a leased fiber circuit.
In what can be described as the case of both cybersquatting and phishing, threat actors have created a site that imitates the legitimate secure note sharing service privnote.com to steal bitcoins.
An "Important" and equally ironic vulnerability, tracked as CVE-2020-1296 was fixed in the Microsoft June 2020 updates that allows privilege escalation in the Windows Diagnostics & Feedback settings app: the annoying privacy setting screen is shown to users when setting up or upgrading Windows.
On June 9th, 2020, IBM Cloud data centers suffered a global outage that caused connectivity issues for many of the web sites and platforms utilizing the service, including BleepingComputer.
On May 30th, select Roku streaming channels stopped working, leaving impacted customers clueless with no idea what was wrong.
Google is indexing the phone numbers used on WhatsApp, and a researcher is concerned that it could cause privacy issues or be used for malicious purposes.
A hacker identifying themselves as "John Wick" and "Korean Hackers" claim to have breached the systems for Indian media giant ZEE5 and are threatening to sell the database on criminal markets.
The newly revealed USBCulprit malware is used by a group known as Cycldek, Conimes, or Goblin Panda and is designed for compromising air-gapped devices via USB.
In what can be described as a truly mysterious phenomenon, an image of a picturesque lake, when set as wallpaper on select Samsung and Google Pixel devices, causes the phone screen and the device to go nuts.
As reported by BleepingComputer, the company recently patched a critical flaw in its "Sign in with Apple" service. What follows now is a mega update across all its major operating systems and devices.
A Joomla database leak has exposed the personal information, including hashed passwords, of 2,700 individuals registered on the Joomla Resources Directory (JRD).
Remember seeing that slick "Sign in with Apple" button across many websites and apps? It turns out that a vulnerability allowed attackers to log in to sites using any Apple ID.