Most exploited API Vulnerabilities in 2022
It is common knowledge that maintaining a high level of cyber security has rapidly become one of the top priorities for businesses of all sizes, and this is particularly trueRead More →
It is common knowledge that maintaining a high level of cyber security has rapidly become one of the top priorities for businesses of all sizes, and this is particularly trueRead More →
Following a hack, one of the biggest and most sophisticated telescopes in the world had to halt operations. A attack on its computer systems this weekend led the Atacama LargeRead More →
A flaw in the Galaxy Store enables remote adversaries to trigger the installation and/or start of an application, resulting in the execution of a remote command on the Samsung phone.SomeRead More →
Threat actors used employee login information they had obtained through phishing to log into one of Dropbox’s GitHub accounts, where they stole 130 code projects. As a result, Dropbox announcedRead More →
Nearly everything uses SQLite, including cellphones, other computer languages, and battleships in the navy. There has a long history of the open-source database engine being particularly secure. Because of itsRead More →
An group going by the name “Black Reward” said that it had obtained and stolen data pertaining to “Iran’s public and private contacts with the International Atomic Energy Agency,” asRead More →
Unknown numbers of prepaid subscribers received warnings from Verizon that attackers had accessed their accounts and were using SIM swapping attacks to exploit credit card information that had been exposedRead More →
Ferrari has suffered an attack that has resulted in 7 GB of stolen company information. The cyberattack has been produced and claimed by the ‘RansomEXX’ cybercriminal group, known for itsRead More →
Researchers have at last cracked the PlayStation’s security after nearly two years of work. The PS5 has been jailbroken and completely unlocked, making this the device’s first serious hack sinceRead More →
Microsoft has acknowledged that it is aware of two zero-day vulnerabilities in Exchange Server that have been used in deliberate attacks. The tech behemoth is developing fixes. Two new MicrosoftRead More →