Costco Wholesale Corporation, a big-box retail store company, discovered a breach at one of its retail store terminals where a card skimming device was being used at the payment counter to skim data.
On discovering the payment card skimming device,...
Like creating various malware variants, cybercriminals often find new techniques to deploy malware and evade security scans. As per a report from Microsoft 365 Defender Threat Intelligence Team, adversaries are increasingly relying on HTML smuggling techniques in email phishing and...
In August, the White House hosted a meeting with some of the most powerful CEOs in the world; from Apple to JPMorgan. The topic for discussion? The rampant scourge of software supply chain attacks, which has surged by a...
As the landscape of cyberthreats expands, it is imperative for enterprises to focus on employing security operations center analysts, also known as SOC analysts, to prevent and mitigate cyberattacks. Companies need to envision and revamp or build new SOC...
HPE-owned Aruba has disclosed that an access key to the data repositories for their Aruba Central network monitoring platform was compromised, allowing an unauthorized external threat actor to access the subset of information.
Internal security monitoring tools installed in the...
Following the growing demand for internet commodities like IP assets, the prices of IPv4 addresses have reached new heights in recent times. Cybersecurity experts warn that this scenario could boost the risk of security threats as opportunistic cybercriminals might...
A joint study from Stanford University Professor Jeff Hancock and security firm Tessian revealed that nine in 10 (88%) data breach incidents are caused by employees’ mistakes. The study “Psychology of Human Error” highlighted that employees are unwilling to...
Cybercriminals often rely on different malware campaigns to exploit new vulnerabilities and break into critical network systems. The latest security research from the Mimecast threat center uncovered a new malware campaign via Sideloading technique. The threat actor behind this...
Researchers at Forescout Research Labs, with support from Medigate Labs, discovered vulnerabilities affecting Nucleus TCP/IP stack, a software that powers devices across the health care system. The lab has discovered a set of 13 new vulnerabilities, which could lead...
Cybercriminals often leverage Distributed Denial of Services (DDoS) techniques to disrupt critical services of global organizations. Days after a massive DDoS attack on multiple voice over internet protocol (VoIP) services in the U.K., Telnyx reported that it had suffered...