Russian search engine and email provider Yandex said today that it caught one of its employees selling access to user …
Apple will proxy Safe Browsing traffic on iOS 14.5 to hide user IPs from Google
Apple’s upcoming iOS 14.5 release will ship with a feature that will re-route all Safari’s Safe Browsing traffic through Apple-controlled …
Accellion to retire product at the heart of recent hacks
US cloud service provider Accellion has announced the end-of-life for its FTA product after the software has been abused in …
Android spyware strains linked to state-sponsored Confucius threat group
Two variants of Android spyware connected to pro-India, state-sponsored hacking campaigns have been discovered. On Tuesday, cybersecurity firm Lookout said …
Adobe patches wave of critical bugs in Magento, Acrobat, Reader
Adobe has patched numerous critical vulnerabilities in a range of software including Magento, Acrobat, Reader, and Photoshop. On Tuesday, the …
CD Projekt Red game studio discloses ransomware attack, extortion attempt
Image: CD Projekt Red Polish game developer CD Projekt Red, the maker of triple-A games like Cyberpunk 2077 and The …
Hacktivists deface multiple Sri Lankan domains, including Google.lk
A mysterious group of hacktivists has poisoned the DNS records of several Sri Lankans (.lk) websites on Saturday and redirected …
Google Chrome sync feature can be abused for C&C and data exfiltration
Image: Catalin Cimpanu Threat actors have discovered they can abuse the Google Chrome sync feature to send commands to infected …
Webdev tutorials site SitePoint discloses data breach
Image: SitePoint, ZDNet, Florian Olivo SitePoint, a website that provides access to a wealth of web development tutorials and books, …
Plex Media servers are being abused for DDoS attacks
Image: Citrix DDoS-for-hire services have found a way to abuse Plex Media servers to bounce junk traffic and amplify distributed …