Chip manufacturer Intel has released 22 security advisories, including seven with a high severity rating that let a privileged user enable local access to targeted devices.
Cisco's Email Security Appliance is affected by a high-rated vulnerability that can allow an unauthenticated remote attacker to launch a denial-of-service attack, the company says. The company and CISA advise that affected software be updated at the earliest.
The January cyberattack on the International Committee of the Red Cross, which compromised the data of more than 515,000 highly vulnerable people, was specifically targeted at the organization, using code designed for execution on the ICRC servers, according to Director General Robert Mardini.
A 60-second TV advertisement, paid for by cryptocurrency exchange platform Coinbase. aired during the Super Bowl on Sunday. It featured a QR code that took those who scanned it to the trading website. Some cybersecurity experts have voiced concerns about using vulnerable QR code on live TV.
Security experts explain how the Rust programming language helps the BlackCat ransomware group execute targeted attacks on critical infrastructure. Compared to traditional languages like C or C++, Rust brings speed, security, stability and unparalleled detection evasion capabilities to the table.
A massive data breach has been uncovered by researchers who say the incident totals in excess of 172 GB of data and affects an estimated 19 million people. The victims are primarily customers of online appointment company FlexBooker, researchers say.
In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including how the BlackMatter ransomware group has rebranded itself yet again, how the DOJ confiscated stolen Bitcoin worth more than $4 billion and takeaways from a U.S. Senate hearing on open-source...
In a recent study by the Ponemon Institute it was revealed that 80% of successful data breaches were the result of zero-day exploits, and sadly, most companies remain ill-equipped to make a significant improvement on this statistic.
However, we can significantly reduce the risk and chance of getting caught out by...
The Sri Lankan government plans to implement the Unitary Digital Identity Framework, or UDIF, a national biometrics-based digital identity project. But cybersecurity experts familiar with India's Aadhaar program, whose framework Sri Lanka is set to use, have voiced concerns over data protection.
Several global Computer Emergency Response Teams have issued alerts as well as fixes for Google Chrome browser and Android operating system vulnerabilities. Countries issuing the alerts include France, India and Canada.
Cybercriminals are taking advantage of the final phase of the Windows 11 upgrade announced on Jan. 26 by installing RedLine Stealer malware to those downloading a fake installer, according to the HP threat research team.
Researchers have detected a massive breach of more than 500 stores. All of the targeted sites were still using the 12-year-old Magento 1 e-commerce platform, which Adobe stopped supporting on June 30, 2020.
With API abuses expected to become the top threat vector in 2022, continued neglect can only mean yet more
successful cyberattacks.
This white paper shows the importance of including APIs in web application security testing and outlines a modern approach to vulnerability testing that covers the entire attack...
Michael Hamilton, CISO at security firm Critical Insight, discusses health data breach trends. The bad news: The number of major breaches reported to regulators in 2021 hit a record high. The good news: The rate of breaches reported last year compared to 2020 appears to be slowing down.
Jeff Williams, co-founder and CTO of Contrast Security, says people have a right to know if the products they use are secure. It's difficult to tell if software is secure, he says, so companies need incentives to build good security programs, improve their software and disclose any flaws they find.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.