Home Blog Page 278
Around 250,000 American and British-based job seekers’ personal information has been exposed after two recruiting sites misconfigured their databases. The exposed information included candidates’ names, addresses, contact information, and work experience. The data leak occurred when recruitment sites Authentic Jobs...
Samsung, a premium smartphone manufacturer, in a statement given to the press, has admitted to being “aware of the case of S10’s malfunctioning fingerprint recognition and will soon issue a software patch.” This statement comes soon after a British...
Cybersecurity experts found a new trace of an ATM Jackpotting Attack via infamous ATM malware named Cutlet Maker. The researchers opined that the usage of this malware by attackers is now rapidly growing across the globe. Cutlet Maker malware was...
Gigamon a leader in network detection and response (NDR) solutions, recently announced the latest version of ThreatINSIGHT, a widely used and trusted product for network detection and response. This enhanced version has placed ThreatINSIGHT in the forefront of the...
MyGate, a security solutions provider for gated premises, recently raised US$ 56 million in a Series B funding round led by Chinese internet giant Tencent Holdings, US-based JS Capital LLC, and Tiger Global Management along with the participation from...
BriansClub, a black-market website for buying stolen credit card data, has been hacked by unknown intruders and extracted around 26 million credit and debit card records. According to cybersecurity journalist Brian Krebs, the website sold more than 9.1 million...
Jack Monroe, a popular food blogger and activist, recently revealed that she lost about £5,000 (around US$ 6,395) from her bank account after being hit by a SIM-Swapping attack. The British-based writer stated that her phone number was seized...
Security researchers discovered a security bypass vulnerability in one of the most widely used Linux commands, the Sudo. According to researcher Joe Vennix, who discovered the vulnerability, the Sudo security bypass flaw can allow a malicious user to run random...
Bob Diachenko is a Cyber Threat Intelligence Director and journalist at SecurityDiscovery.com, a cybersecurity research blog. Bob has over 12 years’ experience working in corporate/product/internal communications with a strong focus on Infosecurity, IT, and technology. In an exclusive interaction with...
Global interconnection and data center company Equinix recently announced the appointment of Michael Montoya as its Chief Information Security Officer (CISO) to further boost the company's commitment to security. Equinix develops robust data center solutions connected with world-class interconnection...