Security
Why consumer IoT devices are the biggest threat to corporate networks
The consumerization of IT promised to empower workforces. Many believed that by enabling employees to access corporate data on their...
Read more about Why consumer IoT devices are the biggest threat to corporate networks
The 8 biggest botnets of all time
Botnets have now become mainstream cyberattack tools. These malicious networks of enslaved devices are behind assaults that run the gamut...
Read more about The 8 biggest botnets of all time
Taiwan government targeted by multiple cyberattacks in April 2020
Part 1: Waterbear Malware In April 2020, highly malicious cyber activity was detected in several Taiwan government agencies. In one...
Read more about Taiwan government targeted by multiple cyberattacks in April 2020
MMO game Street Mobster leaking data of 1.9 million users due to critical vulnerability
Attackers could exploit the SQL Injection flaw to compromise the game’s database and steal user data. The CyberNews.com Investigation team...
Read more about MMO game Street Mobster leaking data of 1.9 million users due to critical vulnerability
The Crimeware-as-a-Service model is sweeping over the cybercrime world. Here’s why
Crimeware-as-a-Service (or Cybercrime-as-a-Service) has increasingly enabled both technically inexperienced criminals and advanced threat actors to rapidly arrange sophisticated attacks. The term...
Read more about The Crimeware-as-a-Service model is sweeping over the cybercrime world. Here’s why
Social media app leaks data of 172,000 users, including location coordinates
The CyberNews investigations team discovered an unsecured data bucket that belongs to Panion, a Swedish software company. The unprotected bucket...
Read more about Social media app leaks data of 172,000 users, including location coordinates
Marketing agency for NFL, Mastercard, MLB and Soundcloud exposes clients’ sensitive data
CyberNews recently discovered that the digital marketing agency teamDigital was exposing multiple environment config files which contain sensitive data. By...
Read more about Marketing agency for NFL, Mastercard, MLB and Soundcloud exposes clients’ sensitive data
Miami-based tech company suffers massive 1TB customer and business data leak
The Miami-based “value-added solutions and technology products” company Intcomex has suffered a major data breach, with nearly 1 TB of...
Read more about Miami-based tech company suffers massive 1TB customer and business data leak
Cybersecurity Awareness Month reminder: Ensure everything connected is protected
Here are a few steps you can take to prevent your smart home from becoming a cyberattack in the waiting....
Read more about Cybersecurity Awareness Month reminder: Ensure everything connected is protected
Crypto exchange leaks every user’s support ticket to every other user
CyberNews recently discovered a bug affecting the cryptocurrency exchange platform Bitexlive in which support tickets were exposed to every visitor...
Read more about Crypto exchange leaks every user’s support ticket to every other user
You need to start taking WFH security seriously. Here’s how
Just a few months ago, having WFH in your work calendar was a perk that carried a stigma. Many battled...
Read more about You need to start taking WFH security seriously. Here’s how
What is a brute force attack & how can you prevent it?
Brute force attacks (also called a brute force cracking) are a type of cyberattack that involves trying different variations of...
Read more about What is a brute force attack & how can you prevent it?
The coronavirus continues to be a phishing nightmare
One in five UK businesses report receiving a phishing email.The coronavirus has been unkind to millions of people. We’ve been...
Read more about The coronavirus continues to be a phishing nightmare
10 Best cybersecurity courses online for 2021
Few career tracks have the kind of job security and growth potential as cybersecurity. Digital data isn’t going anywhere, and...
Read more about 10 Best cybersecurity courses online for 2021
Cybersecurity for gamers: 3 steps to stay safe
How to stay safe while playing onlineThe gaming industry is a massive contributor to the economy, bigger than most other...
Read more about Cybersecurity for gamers: 3 steps to stay safe
Brief history of cybersecurity and hacking
Nowadays, we’re all very aware of the risks of cybercriminals and hackers. But the practice is actually much older than our naughties era, and even quite a bit older than the 1995 film Hackers, starring Angelina Jolie.
Read more about Brief history of cybersecurity and hacking
Australian social news platform leaks 80,000 user records
To increase efforts to secure user data, Snewpit will be reviewing “all server logs and access control settings” to confirm...
Read more about Australian social news platform leaks 80,000 user records
Are encrypted messaging apps really secure?
What are the most secure encrypted messaging apps? This is one of the most common questions that users ask when...
Read more about Are encrypted messaging apps really secure?
Hashing vs encryption vs salting: what's the difference?
What are the ingredients of effective cybersecurity? As with most tech verticals, non-techies charged with researching the best options will...
Read more about Hashing vs encryption vs salting: what's the difference?
Car maintenance company leaks 12.7k US phone numbers, emails and MD5 unsalted passwords
The Ukrainian car maintenance company, XADO, has suffered a data breach of its American website, Xado.us, with 12,724 US phone...
Read more about Car maintenance company leaks 12.7k US phone numbers, emails and MD5 unsalted passwords