If the AirTag has been set to lost mode, the new $30 AirTag tracking device from Apple has a feature that lets anyone who…
Cybercrime in India
Akamai acquires cybersecurity firm
Akamai Technologies has purchased Guardicore to expand its cybersecurity portfolio for content delivery networks (CDNs). The agreement was made public on Wednesday. Akamai will…
Software Security: The Root Cause Conundrum
Regardless of how long we’ve been building software and related security and audit activities, it appears that we’re still treading water. Cybercriminals are still…
Stock market affected by the Ransomware
Ransomware attacks can be extremely costly for businesses, and their frequency is on the rise. The ransom amount might range from thousands to millions…
Cryptocurrency Theft: $3 Million stolen from SushiSwap MISO
An attacker used a supply-chain assault to steal $3 million in cryptocurrency theft from the SushiSwap MISO cryptocurrency platform by infecting Sushi’s private GitHub…
Phishing Gets Easier
Microsoft found a Phishing-as-a-Service (PhaaS) business that is responsible for a large number of corporate phishing attacks. The PhaaS concept has lowered the bar…
Google, Microsoft, and Oracle has most vulnerabilities in early 2021
Google holds the top opening with more than 547 weaknesses, Microsoft is on number two with 432 undesirable openness occurrences and Oracle is on…
Data breaches at Texas behavioral health Center
A data breaches at Texas social wellbeing supplier Texoma Community Center influenced in excess of 24,000 individuals and features how timetables for break notice…
VPN at Virgin Media’s router unmasked zero-day vulnerability
Researchers have discovered a zero-day vulnerability in Virgin Media’s Super Hub 3 routers that allow attackers to see VPN customers’ real IP addresses. Nearly…
Supply Chain Attacks on Open-Source Repositories Surged
According to a new Sonatype analysis, supply chain attacks on open-source public repositories have surged by 650 percent in the last year. This may…