Cyber News

Scammers Abuse Google Drive to Send Malicious Links

Cybercriminals are sending malicious links to hundreds of thousands of users via Google Drive notifications. Scammers are leveraging a legitimate Google Drive collaboration feature to trick users into clicking on malicious links.…
Read more

Nando’s Hackers Feast on Customer Accounts

Multiple chicken diners said their usernames and passwords were stolen and the accounts used to place high-volume orders. Diners at a popular chicken-dinner chain have seen hundreds of dollars siphoned…
Read more

Google Patches Actively-Exploited Zero-Day Bug in Chrome Browser

The memory-corruption vulnerability exists in the browser’s FreeType font rendering library. Google released an update to its Chrome browser that patches a zero-day vulnerability in the software’s FreeType font rendering library that…
Read more

Google’s Waze Can Allow Hackers to Identify and Track Users

The company already patched an API flaw that allowed a security researcher to use the app to find the real identity of drivers using it. A security researcher has discovered…
Read more

TikTok Launches Bug Bounty Program Amid Security Snafus

The move is a distinct change in direction for the app, which has been criticized and even banned for its security practices. TikTok has expanded its vulnerability disclosure policy to…
Read more

Carnival Corp. Ransomware Attack Affects Three Cruise Lines

Hackers accessed personal information of guests, employees and crew for Carnival Cruise, Holland America and Seabourn as well as casino operations. Hackers accessed personal information of guests, employees and crew…
Read more

Office 365: A Favorite for Cyberattack Persistence

Bad actors are leveraging legitimate services and tools within Microsoft’s productivity suite to launch cyberattacks on COVID-19 stay-at-home workers, new research finds. Threat actors are consistently leveraging legitimate services and…
Read more

Fitbit Spyware Steals Personal Data via Watch Face

Immersive Labs Researcher takes advantage of lax Fitbit privacy controls to build a malicious spyware watch face. A wide-open app-building API would allow an attacker to build a malicious application…
Read more

Amazon Prime Day Spurs Spike in Phishing, Fraud Attacks

A spike in phishing and malicious websites aimed at defrauding Amazon.com customers aim to make Prime Day a field day for hackers. Cybercriminals are tapping into Amazon’s annual discount shopping…
Read more

Unpatched Apple T2 Chip Flaw Plagues Macs

A researcher claims that the issue can be exploited by attackers in order to gain root access. A researcher is claiming that Apple devices – with a macOS operating system…
Read more

Skip to content