Cybercriminals Are Using Free EDR Trials to Disable Your Current EDR
A sophisticated attack technique has emerged in which cybercriminals exploit free trials of Endpoint Detection and Response (EDR) software to disable existing security protections on compromised systems. Known as BYOEDR [...]
Apple Fixes Safari Security Flaw Also Targeted in Recent Chrome Zero-Day Exploit
On Tuesday, Apple rolled out security updates for its entire software lineup, addressing a vulnerability that Google identified as a zero-day exploit in Chrome earlier this month. The flaw, labeled [...]
New Choicejacking Attack Exploits Public Chargers to Steal Data from Phones
Choicejacking is a new USB attack that tricks phones into sharing data at public charging stations, bypassing security prompts in milliseconds. If you believed using a public phone charger was [...]
Hackers Compromise Toptal’s GitHub, Release 10 Malicious npm Packages With 5,000 Downloads
In the latest example of a software supply chain attack, unidentified threat actors breached Toptal's GitHub organization account and used the access to upload 10 malicious packages to the npm [...]
A massive data breach on the Leak Zone Dark Web forum has resulted in the exposure of sensitive information, including the IP addresses and geographical locations of over 22 million users
A significant cybersecurity breach has compromised the privacy of users accessing one of the internet's most infamous illegal marketplaces. On Friday, July 18, cybersecurity firm UpGuard uncovered an unsecured Elasticsearch [...]
Get Social