Google announced a new Chrome security feature that ties cookies to a specific device, blocking hackers from stealing and using them to hijack users’ accounts. […]
Category Archives: Security
Auto Added by WPeMatico
Russia’s Prosecutor General’s Office has announced the indictment of six suspected “hacking group” members for using malware to steal credit card and payment information from foreign online stores. […]
Firmware security firm Binarly has released a free online scanner to detect Linux executables impacted by the XZ Utils supply chain attack, tracked as CVE-2024-3094. […]
The Indian government says it rescued and repatriated 250 citizens who sought jobs in Cambodia, only to be forced into conducting cybercrime once they arrived. […]
Google has started automatically blocking emails sent by bulk senders who don’t meet stricter spam thresholds and authenticate their messages as required by new guidelines to strengthen defenses against spam and phishing attacks. […]
The OWASP Foundation has disclosed a data breach after some members’ resumes were exposed online due to a misconfiguration of its old Wiki web server. […]
MarineMax, self-described as one of the world’s largest recreational boat and yacht retailers, says attackers stole employee and customer data after breaching its systems in a March cyberattack. […]
Impersonation scams in the U.S. exceeded $1.1 billion in losses last year, according to statistics collected by the Federal Trade Commission (FTC), a figure that is three times higher than in 2020. […]
Data belonging to more than 1.3 million customers of the PandaBuy online shopping platform has been leaked, allegedly after two threat actors exploited multiple vulnerabilities to breach systems. […]
An alert about a critical Linux vulnerability, a warning about password-spray attacks on Cisco VPNs, and more. Welcome to Cyber Security Today. It’s Monday, April 1st, 2024. I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com and TechNewsday.com in the U.S. Linux administrators and developers must take fast action after the discovery of a backdoor […]