LastPass says hackers had internal access for four days September 16, 2022 LastPass says the attacker behind the August security breach had internal access to the company’s systems for four days until
The Week in Ransomware – September 16th 2022 – Iranian Sanctions September 16, 2022 It has been a fairly quiet week on the ransomware front, with the biggest news being US sanctions on Iranians
Hacker sells stolen Starbucks data of 219,000 Singapore customers September 16, 2022 The Singapore division of Starbucks, the popular American coffeehouse chain, has admitted that it suffered a data breach incident impacting
CISA orders agencies to patch vulnerability used in Stuxnet attacks September 16, 2022 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added half a dozen vulnerabilities to its catalog of Known Exploited
Windows 10 KB5017308 causing issues with Group Policy settings September 16, 2022 The Windows 10 KB5017308 cumulative update released this Patch Tuesday is reportedly causing Group Policy Object (GPO) issues, according to
Fake cryptocurrency giveaway sites have tripled this year September 16, 2022 The number of websites promoting cryptocurrency giveaway scams to lure gullible victims has increased by more than 300% in the first half
Uber hacked, internal systems breached and vulnerability reports stolen September 16, 2022 Uber suffered a cyberattack Thursday afternoon with a hacker gaining access to vulnerability reports and sharing screenshots of the company’s
Akamai stopped new record-breaking DDoS attack in Europe September 16, 2022 A new distributed denial-of-service (DDoS) attack that took place on Monday, September 12, has broken the previous record that Akamai
Hive ransomware claims cyberattack on Bell Canada subsidiary September 16, 2022 The Hive ransomware gang claimed responsibility for an attack that hit the systems of Bell Canada subsidiary Bell Technical Solutions
Hackers trojanize PuTTY SSH client to backdoor media company September 16, 2022 North Korean hackers are using trojanized versions of the PuTTY SSH client to deploy backdoors on targets’ devices as part