If you use Cash App, some of your personal details may have been exposed. In a filing with the US Securities and Exchange Commission (SEC), Cash App developer Block (formerly Square) revealed it suffered a data breach last December in which a former employee downloaded financial reports for millions of US...Read more...
If you wait long enough, your software programs, utilities, and operating system will all take the initiative to apply any applicable updates, depending on how you have things configured. Even if you rely on automatic updates, though, sometimes you should still take matters into your own hands. Such is the case now if...Read more...
We reported a week ago on a security vulnerability in Windows that multiple publicly available exploits can leverage to gain elevated privileges. We advised readers to apply the patch for this vulnerability as soon as possible, and now the Cybersecurity and Infrastructure Security Agency (CISA) is ordering federal...Read more...
A new Security Advisory from Cisco has outlined a huge number of security-related vulnerabilities and issues that have been patched in their latest firmware update. The security advisory says to run updates on the devices affected immediately.
The advisory, which was first published on February 2 and updated again...Read more...
If you're not a Linux sysadmin, you might not be familiar with Control Web Panel, but if you are a Linux sysadmin, you almost certainly are at least aware of the app. Control Web Panel, or CWP, is a free Linux control panel for various web services. It used to be called CentOS Web Panel, but these days it's supported...Read more...
To the casual observer, the world of cryptocurrency may seem like the modern version of the Wild West. It definitely doesn't help the optics when hackers infiltrate one of the leading cryptocurrency exchanges, Crypto.com, and swipe $15 million worth of Ethereum, as a blockchain security and data analytics company...Read more...
Russian hackers are reaching out to Chinese threat actors in an attempt to share tips and collaborate on cyber attacks. This comes at a time where there has been an increase in activity of Mandarin and Chinese-speaking players on RAMP and other communities across the dark web.
RAMP was created last summer by a...Read more...
Hey, guess what? Apple has finally decided to allow sideloading on iOS devices! Just kidding—anyone fooled has not been paying attention to the almighty institution that is Apple, the guardian of consumers and overseer of mobile security. Or something like that. It is, however, being pressured to follow in Google's...Read more...
As it goes, crime never pays, and neither does pirating software, as some people on the internet have come to find out. In the last year, there have been reports that popular antivirus programs, like Avast, disappeared from users’ computers. Researchers at the Czech company found that this activity was tied to a new...Read more...
Back in February, developer CD Projekt Red confirmed it fell prey to a "targeted cyber attack" and went about contacting former employs and contractors, saying at the time that it did not know if any personal data was compromised, but that the "probability of such a leak is low." Now four months later, the Cyberpunk...Read more...
Though industrial cyberattacks, such as those on JBS Global or Colonial Pipeline, are on the rise, the problem is not exclusive to businesses. According to new research, consumer cyber threats jumped nearly 83% in 2020. With new types of malware skyrocketing, users now need to be more careful than ever.
Today, Atlas...Read more...
After a cybercriminal manages to breach a network, it is not all about immediately attacking the target. New research shows that these black hat hackers may lie dormant or lurk on a network for around 250 hours on average before an attack kicks off or they are detected. This means that organizations should know that...Read more...
When you log onto a service, make a purchase, or do something else on the web, you have a decent chance of running into a CAPTCHA. Everyone knows what they look like, and it can be incredibly obnoxious: “Select all the buses. Click on bikes. Does this photo have traffic lights?” CAPTCHAs do not even work all the time...Read more...
We first learned of the cyberattack on Colonial Pipeline's computer systems last week. The company's extensive pipeline network is responsible for supplying the bulk of the United States East Coast with gasoline, diesel, and jet fuel. The company announced that it was a victim of a ransomware attack and had to shut...Read more...
One of the top U.S. fuel pipeline operators had to shutter its network this weekend due to a nasty ransomware attack. This effectively shut down approximately half of the East Coast’s fuel for both air and ground transportation. Though home heating oil prices are not expected to increase as a result, this does raise...Read more...
Last week, the CEO of messaging app Signal got his hands on Cellebrite software, which is typically used for extracting data from mobile devices. Several security vulnerabilities were discovered with this acquisition, leading to Signal including files in its app that would corrupt all present and future data collected...Read more...
This year, there have been several cybersecurity incidents, such as the Microsoft Exchange issue, across numerous industries and government organizations. It appears that the defense industry is now being targeted by at least two China-linked hacking groups who are leveraging Pulse Secure VPN devices from IT company...Read more...
Yesterday, Cyberpunk 2077 developer CD Projekt Red revealed that it would be delaying the highly anticipated v1.2 Patch. Cyberpunk 2077 v1.2 is supposed to bring another round of bug fixes and performance improvements for the troubled game. At the time, CDPR would only say that the cyberattack earlier this month was...Read more...
Game developer CD Projekt Red announced on Twitter that it has fallen prey to a "targeted cyber attack," in which an unidentified actor (or actors, as the case might be) gained unauthorized access to its internal network and are demanding a ransom. In a ransom note left by the attacker(s), it is claimed they managed...Read more...
Earlier in the week, user PixelRick discovered a vulnerability in Cyberpunk 2077, leading to code execution on a system via malicious data files. While modders were initially blamed for the risk, it turns out that the issue stemmed from poor coding on CD Projekt Red’s part. Now, the Poland-based games company has...Read more...
Yesterday, we reported that CD Projekt Red sent out a warning that was effectively against "downloading mods", but it appears that we did not have the full story from the developers of Cyberpunk 2077. According to users on the CD Projekt Red forums, the Cyberpunk 2077 devs are partially to blame for what seems to be...Read more...
When it comes to using the internet in any way, a general rule of thumb is that you should never download software from a source that you do not trust. Yesterday, CD Projekt Red Support sent out a tweet to dissuade people from downloading mods for Cyberpunk 2077 because a vulnerability was found the modding system's...Read more...