Browsing: Security
Microsoft disrupts cybercrime business by selling fraudulent accounts to notorious hacking gang
Microsoft says it has successfully dismantled the infrastructure of a cybercrime operation that sold access to fraudulent Outlook accounts to other hackers, including the notorious Scattered…
Companies are increasingly curious about AI and the ways it can be used to (potentially) increase productivity. But they are also wary of risks. On a…
Apple introduced new security settings with its iOS 17.3 developer beta on Tuesday to prevent thieves from entering your password to get your information, including account…
Apple will no longer give push notification user data to the police without a warrant
Apple said it will no longer hand over users’ push notification files to law enforcement unless the company receives a valid court order. In Law enforcement…
Ukraine’s largest telecommunications provider Kyivstar says it has suffered a “massive” cyber attack that has disrupted phone and internet services for millions of people across the…
In November, the cyber security collective vx-underground wrote on X, formerly Twitter, that unknown hackers claimed to have breached Coin Clouda bankrupt Bitcoin ATM company. According…
Two days before 23andMe revealed that hackers accessed the personal and genetic data of nearly 7 million customers, the genetic testing giant updated its terms of…
US healthcare giant Norton says hackers stole millions of patient data in ransomware attack
Kentucky-based nonprofit healthcare system Norton Healthcare has confirmed that hackers accessed the personal data of millions of patients and employees during a previous ransomware attack. Norton…
Millions of patient scans and health records leaked online thanks to decades-old protocol flaw
Investigators say they found exposed patient imagery, as well as names, addresses and phone numbers Thousands exposed Servers are spilling the medical records and personal health…
The US cybersecurity agency CISA has warned that unknown hackers broke into the servers of a federal government agency by exploiting a previously known vulnerability in…