Tag: Cyberattacks
Telephony Denial-of-Service Attacks on Rise, FBI Suggest Recommendations
The FBI has warned about potential security risks with Telephony Denial-of-Service (TDoS) attacks. In an official Private Industry Notification (PIN), the agency revealed how...
California DMV Halts Operations After Vendor Suffers Ransomware Attack
A ransomware attack on a third-party vendor for the California Department of Motor Vehicles (DMV) may have affected users’ sensitive information. DMV stated that Automatic Funds...
This CVE in Agora.io’s SDK Left Video Calling Apps Open to...
McAfee Advanced Threat Research (ATR) team uncovered a critical security vulnerability in Agora, a video calling software development kit (SDK), which could allow an...
These Unpatched Flaws in SHAREit App Could Leak Your Data
Multiple security vulnerabilities in the Android version of the SHAREit mobile application could allow an attacker to run Remote Code Execution (RCE). According to...
North Korea Accused by its Southern Counterpart for Cyberattack on Pfizer
North Korea seems to be getting desperate to resolve the COVID-19 crisis even when the country has not yet officially reported any positive cases....
Is Clubhouse App Leaking Users’ Sensitive Data to Chinese Govt?
It seems like Clubhouse, a popular invite-only audio chat app, ran into serious pressure after researchers from Stanford University warned that the app is...
Did Remote Working Make Cybercriminals’ Lives Easy?
With remote work becoming the new normal, organizations globally are getting used to secure the work devices virtually. While the entire working community fit...
Over 1,000 Hands Wrote 4,032 Lines of Code to Execute the...
Ever since its discovery in December 2020, the SolarWinds hack has been the talk of the town. Experts have analyzed, dissected, and unearthed many...
How DarkSide Ransomware Attack Led Canadian Car Rental Agency to Temporarily...
Canada-based car and truck rental services provider Discount Car and Truck Rentals has been hit by DarkSide ransomware. The attackers claimed to have stolen...
Here’s Why You Are More Likely to Be Targeted with a...
Threat actors constantly innovate and adopt new techniques to perform their phishing activities successfully. They often leverage compromised email IDs, login credentials, and other...