Home News Page 652

News

News from the cyber security world and abroad. Enjoy current affairs of the cyber underground and more. Browse popular news articles covering hackers and cybercrimnals alike. Discover new vulnerabilities and emerging threats that we cover. Looking for Malware or data breach related articles? Than the cyber post has all the cybersecurity information you can take in!

In addition to current affairs, we like to educate our readers. For instance, we have a learning section. Head over to our educational section and enjoy. Read some great tips and articles for securing your accounts and data. Protect yourself from phishing and basic password vulnerabilities. Looking for something more exciting to read? Than maybe some darknet stories will tickle your fancy. But sit back and enjoy exciting cybercrime stories from the darkweb. Learn of arrests and the data that carders and fraudsters peddle in.

Facebook Debuts Bug-Bounty ‘Loyalty Program’

0
Facebook bounty hunters will be placed into tiers by analyzing their score, signal and number of submitted bug reports — which will dictate new bonus percentages. Facebook...

Fitbit Spyware Steals Personal Data via Watch Face

0
Immersive Labs Researcher takes advantage of lax Fitbit privacy controls to build a malicious spyware watch face. A wide-open app-building API would allow an attacker to build a malicious...

Russian Who Hacked LinkedIn, Dropbox Sentenced to 7 Years in Prison

0
By: Swati Khandelwal A Russian hacker who was found guilty of hacking LinkedIn, Dropbox, and Formspring over eight years ago has finally been sentenced to 88 months in United States...

Beware: New Android Spyware Found Posing as Telegram and Threema Apps

0
By: Ravie Lakshmanan A hacking group known for its attacks in the Middle East, at least since 2017, has recently been found impersonating legitimate messaging apps such as Telegram and...

Common bugs make anti-virus solutions vulnerable to exploitation

0
By: Teri Robinson The very anti-malware solutions meant to protect organizations for things like increasing privilege can be...

Phishing scam lures employees by teasing secrets of Trump COVID diagnosis

0
By: Bradley Barth A go-to strategy among cyberattackers is developing phishing lures based on timely news events. Sure...

Is Your Organization Protected Against IAM Misconfiguration Risks?

0
In the latest edition of the Unit 42 Cloud Threat Report, our researchers explore the cloud threat landscape with a deep focus on identity and access management (IAM) misconfiguration...

3 Simple Techniques to Add Security Into the CI/CD Pipeline

0
I propose that there are three fundamental and concrete practices DevOps and security teams can adopt to add security into the CI/CD pipeline and secure critical applications, involving: Infrastructure-as-Code (IaC). Kubernetes...

Cyberattacks Up, But Companies (Mostly) Succeed in Securing Remote Workforce

0
Despite fears that the burgeoning population of remote workers would lead to breaches, companies have held their own, a survey of threat analysts finds.Since the onset of the pandemic,...

Critical Zerologon Flaw Exploited in TA505 Attacks

0
Microsoft reports a new campaign leveraging the critical Zerologon vulnerability just days after nation-state group Mercury was seen using the flaw.Microsoft has observed new threat activity exploiting the critical...
Error decoding the Instagram API json