ALL POSTS Worldwide law enforcement action takes down major DDoS booter services Christopher Boyd December 16, 2022 0 Comments Criminals making use of booter services which execute Distributed Denial of Service (DDoS) attacks to take down websites will have to try… Is Apple about to embrace third-party app stores? Jovi Umawing December 15, 2022 0 Comments On Tuesday, Bloomberg reported that Apple is preparing to allow access to third-party app stores on all iPhone and iPad devices owned by EU… Uber data stolen via third-party vendor Jovi Umawing December 15, 2022 0 Comments Uber is facing a new cybersecurity incident after threat actors stole some of its data from Teqtivity, a third-party vendor that… Play ransomware attacks city of Antwerp Pieter Arntz December 14, 2022 0 Comments The city of Antwerp’s digital systems have come to a grinding halt. The Flemish government under which Antwerp resides has confirmed… Electronic Sales Suppression Tools are cooking the books Christopher Boyd December 13, 2022 0 Comments When you see point of sale software in the news, it’s usually because the terminal has been compromised and is now… iPhone user watches as stolen phone travels from UK to China Christopher Boyd December 13, 2022 0 Comments Have you ever wondered what happens to your phone if it’s stolen while on vacation or a business trip? The answer… The weirdest security stories of 2022 Christopher Boyd December 12, 2022 0 Comments There’s been a lot of weird and frankly bizarre attacks over the course of 2022, nestled in amongst the usual ransomware… Iranian hacking group uses compromised email accounts to distribute MSP remote access tool Pieter Arntz December 12, 2022 0 Comments Researchers have uncovered a new campaign by hacking group MuddyWater, aka Static Kitten, in which a legitimate remote access tool is sent… Indiana sues TikTok, describes it as “Chinese Trojan Horse” Jovi Umawing December 12, 2022 0 Comments On Wednesday, the State of Indiana filed two lawsuits against TikTok, Inc, the company behind the same name app, and its… Previous 1 … 182 183 184 185 186 … 618 Next Contributors Threat Center Podcast Glossary Scams