Home Blog Page 57
A configuration issue in Microsoft Power Apps resulted in a massive data breach, exposing the sensitive information of millions of users. An analysis from information security firm UpGuard revealed that over 38 million records from 47 different government and...
Today, no industry sector is safe from cyberattacks, as threat actors target businesses with a malicious aim of gaining information or monetary benefits. The digital age has undoubtedly ushered in beneficial changes in the life and work of many....
In a new kind of insider threat campaign, cybersecurity researchers found a Nigerian cybercriminal group enticing unwitting employees by offering them a share of their presumed ransom if they deploy Black Kingdom ransomware, also known as DemonWare or DEMON,...
While organizations are battling to boost their cybersecurity capabilities, cybercriminals continue to prey on security loopholes. Active exploitation of unpatched vulnerabilities has become a common attack vector today. The Cybersecurity and Infrastructure Security Agency (CISA) recently issued a warning...
Phishing is one of the most popular social engineering techniques cybercriminals use to distribute malware and steal personal information. As per recent reports, fraudsters have been leveraging an XSS vulnerability in UPS.com to circulate fake UPS Invoice MS Word...
There are nearly two billion websites on the Internet. Security flaws in many of them are fertile soil for easy takeover. Analysts claim that at least half of all content management system (CMS) installations are out of date and...
Organizations cannot undermine the importance of cybersecurity strategies and the need for an ethical hacker community to keep their businesses afloat amidst a rise in cyberattacks. The increasing reliance on digital applications also raises privacy and security concerns globally.  The demand for professional ethical hackers is only going to increase in...
Security researcher Jonhat shared a tweet exposing a zero-day vulnerability in Razer Synapse installation software. A simple plug-and-play USB or dongle can give you Windows admin privileges. In the computer peripherals industry, Razer is known for its gaming mice and...
In a recent tweet, Jacqui Henrich, the White House correspondent for Fox News, reported a cyberattack on the U.S. State Department. The breach was first notified by the Department of Defense Cyber Command. According to the Twitter thread of the...
A new KPMG survey reveals a deep disconnect between corporate data practices and the general population’s expectations around transparency and data privacy. As companies collect more personal data, survey respondents are increasingly concerned about how their data is being...