Leaks

toyota

Toyota Discloses Data Breach Impacting Source Code

Toyota, a Japanese automaker, has identified a security breach involving source code stored on GitHub that may have given third parties access to some 300,000 customer email addresses. According to…

Read More
Hostinger Resets User Passwords after data breach

123K Individuals Data Exposed in Tucson Data Breach

The Tucson Data Breach is a recent data breach that occurred in the city of Tucson, Arizona. The breach affected approximately 1.2 million individuals, who had their personal information exposed….

Read More
Open EDR
samsung

Samsung Sued Over Recent Data Breaches

Two Samsung customers, who are being represented by Clarkson Law Firm, have launched a class action lawsuit against the electronics maker for the two data breaches it had in 2022….

Read More
Microsoft Hesitates About Machine Learning Can Also Be Used By Hackers

Vulnerabilities in the iBoot Power Distribution Unit Let Hackers Remotely Shut Down Devices

Researchers found serious flaws in Dataprobe’s iBoot power distribution unit (PDU), which may be used by hostile parties to remotely hijack the device and shut down any connected devices, possibly…

Read More
computer girl

novoShield Emerges From Stealth With Mobile Phishing Protection App

With an enterprise-grade iPhone protection app, mobile phishing defense firm novoShield has come out of hiding. According to novoShield, the new solution was created to shield organizations and end users…

Read More
Geoscience Australia Highly Vulnerable to Cyber Attack min

FBI Issues Warning About Increase in Attacks Against DeFi Platforms

The FBI has issued a warning about an uptick in hacks aimed at stealing cryptocurrencies from decentralised finance (DeFi) services. The government claims that criminals are using the rising popularity…

Read More
Geoscience Australia Highly Vulnerable to Cyber Attack min

Security Firm Discloses CrowdStrike Issue After ‘Ridiculous Disclosure Process’

Following what it referred to as a “ridiculous vulnerability disclosure process,” a security company has revealed the specifics of a problem with a CrowdStrike product. Following the disclosure, CrowdStrike clarified…

Read More
DDoS Attackers

Ring Android app flaw allowed access to camera recordings

In the Amazon Ring app for Android, Amazon has patched a high-severity vulnerability that may have let hackers download customers’ recorded camera footage. The flaw was spotted and reported to…

Read More
Understanding What Is Malware Analysis

North Korean hackers target crypto experts with fake Coinbase job offers

North Korean hackers use phoney Coinbase job offers to target cryptocurrency professionals. The renowned North Korean hacking outfit Lazarus has uncovered a new social engineering scheme in which the hackers…

Read More
36TB Data Breach The Culprit Lenovo’s Obsolete Iomega NAS

Over 1 Billion Individual Data Leaked Due to Alleged Chinese Police Database Hacking

In a leak that, if verified, could be one of the biggest data breaches in history, hackers might have obtained a wealth of information belonging to over I billion Chinese…

Read More

Page 3 of 11

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register