Crooks Combine Phishing and Impersonation For Higher Success Rate

While phishing continues to be the prevalent threat in malware-less email-based attacks, cybercriminals refine their methods…

Mirai, Gafgyt IoT Botnets Reach To the Enterprise Sector

Mirai and Gafgyt, two of the best known IoT botnets, have forked once again, but the…

Data Management Firm Exposes 445 Million Records

A database with over 200GB of data was found on a server left defenseless and open…

Apple’s Safari Falls For New Address Bar Spoofing Trick

An unpatched vulnerability in the Safari web browser allows an attacker to control the content displayed…

British Airways Fell Victim To Card Scraping Attack

[...]

Exploit Affecting Tor Browser Burned In A Tweet

[...]

Over 3,700 MikroTik Routers Abused In CryptoJacking Campaigns

Ever since exploit code for CVE-2018-14847 became publicly available, miscreants have launched attacks against MikroTik routers.…

Trend Micro Apps Leak User Data, Removed from Mac App Store

Multiple apps developed by Trend Micro are no longer available in the Mac App Store after…