Wawa, a U.S. chain with over 850 convenience stores, suffered a payment card data breach which exposed customers’ credit card numbers, debit card numbers, expiration dates and cardholder names.
Europol’s IOCTA report shows crypto ransomware as one of the most prominent new tactics of organized cybercrime with steady increase in the size of ransom demands.
Market for hack-for-hire services could be expanding significantly with recent unmasking of a Dark Basin group that has been operating in the shadows for years.
Preloaded apps on current Lenovo, HP and Dell systems are found to have unique and serious security vulnerabilities that require end users to take extra steps to fix.
To combat coronavirus outbreak, some E.U. nations are making use of GDPR emergency provisions to loosen up the rules in collecting and processing sensitive health data.
A WhatsApp security flaw on the desktop version was recently discovered that allows hackers to rifle through user accounts and remotely access their files on PC via malicious messages.
Most ransomware attacks begin with some combination of phishing and social engineering. An enterprising ransomware gang in Nigeria appears to be skipping this messy step, simply making a direct pitch to employees to join in on the attack.
Supply chain vulnerability in the ThroughTek "Kalay" network, a cloud-based communications platform used by an estimated 83 million IoT devices, could allow for remote compromise and control.
Apple argued that Corellium's use of its software constituted a copyright violation; a federal judge has disagreed, throwing the case out on the basis of the company's software being a tool for security researchers.
North Korean hackers are focusing heavily on Magecart attacks by planting malicious code in online shopping carts of individual stores and payment processors.