Malwarebytes detected a credit card skimmer belonging to a potent Magecart attack threat actor on Segway's online store embedded within a favicon.ico image file.
KELA found that the sale of network initial access methods in underground forums was worth millions of dollars, and brokers resorted to selling in private conversations.
New cyber incident reporting bill that has been introduced to the Senate would create new ransomware payment reporting requirements if passed, including a strict 24-hour limit for any business with more than 50 employees.
Recent disclosure reveals the EU parliament suffered a major data breach exposing sensitive data of over 1,200 elected members of the European Parliament alongside 15,000 other accounts of EU affairs professionals.
New iPhone vulnerability in default iOS mail application can be triggered even without the victim clicking on an attachment or following a link on the email.
Report shows that shadow code from third-party libraries is a risk for web applications and concern for owners afraid of brand damage, lawsuits, and regulatory actions.
IT security teams need to develop a SaaS management strategy to mitigate and address their shadow applications to mitigate the security and compliance risks shadow IT poses to their organizations.
Popular Android file-sharing app SHAREit with over a billion downloads has a security flaw that could leak users’ sensitive information and allow remote code execution.
Healthcare provider Shields Health Care Group suffered a data breach that exposed sensitive personal health information for at least 2 million patients.
As the world becomes more complex non-traditional approaches to ensuring data security and protection must be evaluated. In this article Wei Chieh, the founder of SWARMNETICS draws a parallel between how we treat open source software and the Asian organisational attitude toward White Hat hackers (or ‘independent security researchers’) as assets that might help to stem the tide of security breaches that Asian companies face today.