The Evolution of Account Takeover Attacks: Initial Access Brokers for IoT
Head off account takeover attacks by being proactive about IoT security. Start with designing and building better security protocols into…
Head off account takeover attacks by being proactive about IoT security. Start with designing and building better security protocols into…
The U.S. Federal Communications Commission wants to strengthen federal law enforcement and modernize breach notification requirements for telecommunications companies so…
Unique conditions contribute to outsized telecom fraud across the continent, but working together can bring solutions.
The bug affects several Aiphone GT models using NFC technology and allows malicious actors to potentially gain access to sensitive…
Matrix decentralized communication platform has published a security warning about two critical-severity vulnerabilities that affect the end-to-end encryption in the software…
By Shubham Patidar, Research Consultant at Fact.MR In today’s technology driven world, the workforce is spread out between […] The…
It has been a fairly quiet week on the ransomware front, with the biggest news being US sanctions on Iranians…
The ransomware gang has been seen exploiting a Mitel RCE flaw discovered in VoIP devices in April (and patched in…
The Lorenz ransomware gang now uses a critical vulnerability in Mitel MiVoice VOIP appliances to breach enterprises using their phone…
The National Police of Ukraine (NPU) took down a network of call centers used by a cybercrime group focused on…