Hackers use PoC exploits in attacks 22 minutes after release
Threat actors are quick to weaponize available proof-of-concept (PoC) exploits in actual attacks, sometimes as quickly as 22 minutes after…
Threat actors are quick to weaponize available proof-of-concept (PoC) exploits in actual attacks, sometimes as quickly as 22 minutes after…
AT&T Corp. disclosed today that a new data breach has exposed phone call and text message records for roughly 110…
Remember when hackers used to write their own malware? Kids these days don't want to work, they just want freely…
The Russia-based cybercrime group dubbed "Fin7," known for phishing and malware attacks that have cost victim organizations an estimated $3…
Businesses need to find a balance between harnessing the benefits of AI assistants and safeguarding sensitive information — maintaining trust…
Even the NSA leaves bugs in its software. In this case, it's the kind of cross-site issue that regularly slips…
In an ongoing extortion campaign against Ticketmaster, threat actors have leaked almost 39,000 print-at-home tickets for 150 upcoming concerts and events,…
Roblox announced late last week that it suffered a data breach impacting attendees of the 2022, 2023, and 2024 Roblox…
Hackers have leaked what they claim is Ticketmaster barcode data for 166,000 Taylor Swift Eras Tour tickets, warning that more…
Cybercriminals are selling credentials linked to the tournament on underground markets, with some geopolitics playing out in denial-of-service attacks.