Please turn on your JavaScript for this page to function normally.
Verizon
Verizon details breaches they were called in to investigate

If at all possible, organizations like to keep details of the breaches they suffered under wraps, mostly to safeguard their reputation and to minimize legal trouble. As …

Tor browser
Tor Browser 8 is out: What’s new?

Version 8 of Tor Browser, the multiplatform browser that routes traffic through the Tor anonymity network, has been released this week. About the Tor Browser and this latest …

British Airways
Financial info of 380,000 British Airways customers stolen in site, app breach

British Airways has suffered a data breach and has confirmed that personal and financial details of some 380,000 customers have been compromised. About the breach “From …

Cisco
Cisco fixes a host of security holes, including latest Apache Struts flaw

Cisco has plugged a heap of security holes – three of which are critical – in a variety of its products. The critical flaws The flaws deemed critical are: A DoS …

Schneider Electric Modicon M221
Remotely exploitable flaw in Schneider Electric PLCs is a danger to OT networks

A vulnerability in the Schneider Electric Modicon M221, a programmable logic controller (PLC) deployed in commercial industrial facilities worldwide, can be exploited to …

payment card
Card skimming malware found on thousands of Magento-based sites

A card skimming operation has compromised 7,339 Magento-based online stores, allowing the attackers to quietly slurp payment card info as it’s being entered by …

Google Chrome
Chrome 69 is out, includes many functional and security changes

Ten years ago Google released the first iteration of its Chrome browser. On Tuesday, the company pushed out version 69. It comes with a number of design and functional …

tunnel
There are no real shortcuts to most security problems

For Xerox Chief Information Security Officer Dr. Alissa Johnson, human ingenuity, partnerships and automation are the answer to most security problems the company has …

3d printing
Access misconfiguration opens 3D printers to remote attacks

Spurred by a report coming from a regular reader, SANS ISC handlers Richard Porter and Xavier Mertens searched for OctoPrint interfaces for 3D printers exposed online and …

Philips health
Phillips plugs security flaws in e-Alert tool

Dutch tech company Phillips has fixed several serious security flaws in Philips e-Alert, a tool that helps magnetic resonance imaging (MRI) systems work as intended. About …

Windows
0patch releases micropatch for Windows Task Scheduler zero-day

Earlier this week a security researcher that goes by “SandboxEscaper” published details and a PoC exploit for a zero-day local privilege escalation vulnerability …

cryptocurrency
How lucrative is web-based cryptojacking?

1 out of 500 of the one million most visited websites according to Alexa contains a web-based cryptominer that starts mining as soon as the website has been opened in the …

Don't miss

Cybersecurity news