Online attacks
Unsecured Authy MFA API Exploited For Malicious Phone Number Verification
Reportedly, criminal hackers exploited an unsecured Authy (an MFA app) API to verify phone numbers …
Online attacks
Reportedly, criminal hackers exploited an unsecured Authy (an MFA app) API to verify phone numbers …
Researchers shared insights about a new attack strategy that exposes users’ activities to snoopers. Identified …
Heads up, WordPress admins! Researchers ask WordPress users to update their sites with the latest …
Heads up WordPress admins. If you’ve been running Dessky Snippets plugin on your WordPress e-stores, …
Another attack has emerged online, demonstrating the notorious Rowhammer’s persistent existence as a threat to …
Heads up, Android users! Another wave of malicious apps has flooded the Google Play Store …
Researchers have found numerous malware groups actively exploiting a Google Cookie vulnerability for session hijacking. …
Researchers have devised a new attack strategy, called “Terrapin,” that exploits vulnerabilities in the SSH …
Researchers have devised a new attack strategy that threatens the security of future CPUs. Identified …
Given the continuous rise in active exploitation of the now-known CitrixBleed flaw, governments issued new …
