Security researchers discovered that an iPhone could be turned into a surveillance tool that can expose the victim’s sensitive information, including contacts, Live Location, chat history, emails, photos, and passwords.
According to Ian Beer, Google’s Project Zero researcher, a number...
Jack Dorsey, the CEO & Co-founder of Twitter, had his own Twitter account compromised by a hacking group named Chuckle Squad. According to an official statement, hackers used SIM Swapping Attack technique to take over Jack’s account by exploiting...
Security leaders are grappling with a number of challenges today but with more automation coming into cybersecurity, they are seeing some solutions to ease those challenges. Certain areas of cybersecurity are leveraging automation, AI and ML, and can detect...
Broadcom, a global technology leader that designs, develops and supplies semiconductor and infrastructure software solutions, today announced an agreement to acquire the enterprise security business of Symantec Corporation for $10.7 billion in cash. The addition of Symantec's enterprise security...
By V3 Cybersecurity
Our last article “Addressing the Unanswered Organizational Needs of Today’s CISO” focused on disrupting legacy consulting models and providing CISOs with a new capability for establishing real time and dynamic cybersecurity visibility and benchmarking into their security...
By Rudra Srinivas
Most companies rely on e-mail correspondence as a primary means of communication even when it comes to sharing classified information like customer account numbers, employee credentials, and confidential negotiations. But the companies must remember that all communications...
Axonius, a developer of end-to-end device management platform, recently raised $20 million in a Series B funding round led by OpenView along with the participation from Bessemer Venture Partners, YL Ventures, Vertex, WTI, and Emerge. The New York and...
Security researchers found that cybercriminals are using WordPress plugins for an ongoing attack campaign targeting numerous WordPress sites. The researchers are from the security firm WordFence. The attackers are exploiting vulnerabilities in the WordPress plugins to divert traffic from...
CrowdStrike, a provider of cloud-delivered endpoint protection services, recently launched a $20 million early-stage investment fund with the partnership from Accel. The new investment fund, named as Falcon Fund, is intended on seed and Series A investments in security...
Security researchers found a Malware in the CamScanner, a phone-based PDF creator, Android application, which has over 100 million downloads from the Google Play Store.
According to security researchers Igor Golovin and Anton Kivva from Kaspersky, the Malware dubbed Trojan-Dropper...














