Cyber Security

The 3 Most Prevalent Cyber Threats of the Holidays

As many of us deck the halls, some folks are dealing with the cybersecurity holiday season — that perilous time of year rife...

Amazon sues REKK fraud gang that stole millions in illicit refunds

Amazon's Customer Protection and Enforcement team has taken legal action against an underground store refund scheme that has resulted in the theft of...

Founder of Bitzlato Cryptocurrency Exchange Pleads Guilty in Money-Laundering Scheme

Dec 08, 2023The Hacker NewsCryptocurrency / Cyber Crime The Russian founder of the now-defunct Bitzlato cryptocurrency exchange has pleaded guilty, nearly 11 months after...

Kenyan Digital Identity System Shelved Over Data Protection Concerns

Due to the lack of any data-protection impact assessments done on it, Kenya will not be launching a digital identification system this year...

The past could return to haunt you

Critical Infrastructure Legacy protocols in the healthcare industry present dangers that can...

Privilege elevation exploits used in over 50% of insider attacks

Elevation of privilege flaws are the most common vulnerability leveraged by corporate insiders when conducting unauthorized activities on networks, whether for malicious purposes...

WordPress Releases Update 6.4.2 to Address Critical Remote Attack Vulnerability

Dec 08, 2023NewsroomVulnerability / Website Security WordPress has released version 6.4.2 with a patch for a critical security flaw that could be exploited by...

Latest articles