Home Blog Page 264
Security analysts from cybersecurity firm CyberArk recently found a critical vulnerability in Microsoft Azure that allows attackers to take control over Microsoft Azure user accounts. The vulnerability, dubbed as BlackDirect, specifically impacts Microsoft’s OAuth 2.0 applications, according to researchers. It’s...
Popular video-sharing app TikTok recently hit with a class-action lawsuit in the U.S. claiming that the company has been surreptitiously transferring users’ data to Chinese servers, without the user’s consent. The proposed class-action lawsuit was filed in California federal court by Misty Hong, a...
Shinzo Abe, the Prime Minister of Japan, recently announced the decision of Japan joining the North Atlantic Treaty Organization’s (NATO) accredited cyber defense hub in Tallinn, Estonia. With this decision, Japan becomes a full-fledged participant in NATO's Cooperative Cyber Defense...
Often dubbed as an idiot box, the television is no longer just a dumb gadget. It’s become smart, and is growing smarter, in-line to become one of the smartest household gadgets. From kids to adults, everyone loves to have...
Researchers have discovered a malware operation that uses a trojanized version of Tetris game to target healthcare and educational institutions for credential stealing. Security pros at Blackberry Cylance stated that threat actors are trying to distribute ransomware with a malware named “PyXie”. It’s said...
FaceApp, the AI-powered photo-morphing app that took the internet by storm for its unique features and controversial privacy policy has hit the headlines again. The FBI recently slammed FaceApp as a counterintelligence threat and advised its users to be vigilant.  The comments come...
The New Zealand Police have admitted a potential data breach on its online notification platform set up to buyback firearms. The issue came into light after a dealer reported to the Police that he was able to see all firearm owners' details...
The Healthcare industry has constantly been in the firing line of hackers for quite a few years now. The reason behind the following limelight is the worth this data carries on the darker side of the web. Canon Medical...
Researchers from the security firm SafeBreach Labs recently disclosed multiple security vulnerabilities in Autodesk, Trend Micro, and Kaspersky software. The company published three different security advisories, describing the issues, to report to the vendors before public release. According to SafeBreach...
By Derek Manky, Chief of Security Insights and Global Threat Alliances, Fortinet Cybercriminals continue to refine existing malware to evade detection and deliver increasingly sophisticated and malicious payloads. They’re increasingly using banking trojans to drop other payloads and additional banking...