Hacker has data of 400 mn Twitter users: Hudson Rock
A hacker has stolen the data of nearly 400 million Twitter users and put it up for sale on the dark web, according to...
LastPass reveals hackers copy backup of customer vault data
Encrypted password manager LastPass has revealed hackers were able to copy a backup of customer vault data in a recent data breach.
LastPass is a...
Guardian faces ransomware attack on IT systems
The Guardian, a leading UK-based newspaper with strong online news presence, has confirmed a ransomware attack on IT systems has impacted its business.
The publication...
Sports betting operator BetMGM faces data breach
Sports betting service BetMGM said personal information of its customers were obtained in an unauthorized manner, but did not specify the number of users...
Mailgun, MailChimp and Sendgrid users face cyber security risk
More than 54 million mobile app users of popular transactional and marketing email service providers -- Mailgun, MailChimp and Sendgrid – are facing cyber...
Top cyber security vendors in Q3: Canalys
Palo Alto Networks (8.4 percent share), Cisco (6.9 percent) and Fortinet (6.7 percent) are the top three cyber security vendors during the third quarter of...
Abanca faces $3.29 mn penalty for delay in reporting cyber attack
European Central Bank has imposed a penalty of $3.29 million on Spanish bank Abanca for its delay in reporting a cyber attack that forced...
Microsoft reveals top countries originating IoT malware infection
China, United States, India, Korea and Taiwan are the top five countries originating Internet of Things (IoT) malware infection in 2022, a Microsoft report...
Hacking group APT5 attacks networking gear from Citrix
China-based A hacking group APT5 has exploited a vulnerability in networking gear from U.S. technology company Citrix Systems to spy on targets.
A U.S. National...
921 password attacks are happening every second, here’s how to stay protected
Our technology is proliferating, and we are now literally dwelling in a virtual world. However, such advanced technologies have their limitations. While using service...