29.9 C
New York

Cyber Security

ZuoRAT Can Take Over Widely Used SOHO Routers

Devices from Cisco, Netgear and others at risk from the multi-stage malware, which has been active since April 2020 and shows the work of...

Study Reveals Traditional Data Security Tools Have a 60% Failure Rate Against Ransomware and Extortion

SAN FRANCISCO, Calif., June 30, 2022 - Titaniam, Inc., the industry's most advanced data security platform, announced today the ‘State of Data Exfiltration &...

S3 Ep89: Sextortion, blockchain blunder, and an OpenSSL bugfix [Podcast + Transcript]

by Paul Ducklin LISTEN NOW Click-and-drag on the soundwaves below to skip to any point. You can also listen directly on Soundcloud. With Doug Aamoth and Paul Ducklin. Intro...

A Guide to Surviving a Ransomware Attack

Oliver Tavakoli, CTO at Vectra AI, gives us hope that surviving a ransomware attack is possible, so long as we apply preparation and intentionality...
Category Template

Leaky Access Tokens Exposed Amazon Photos of Users

Hackers with Amazon users’ authentication tokens could’ve stolen or encrypted personal photos and documents. The Amazon Photos app for Android insufficiently protected user access tokens,...

Firefox 102 fixes address bar spoofing security hole (and helps with Follina!)

by Paul Ducklin This month’s scheduled Firefox release is out, with the new 102.0 version patching 19 CVE-numbered bugs. Despite the large number of CVEs, the patches...
Category Template

Recent articles

spot_img