
T-Mobile hit by data breaches from Lapsus$ extortion group
Through multiple breaches, the Lapsus$ cybercriminal group was able to steal source code from T-Mobile, says KrebsOnSecurity.
You're on page 60, See the latest articles on Security.
Through multiple breaches, the Lapsus$ cybercriminal group was able to steal source code from T-Mobile, says KrebsOnSecurity.
The OAuth authentication framework provides users with a safe way to access online services without putting their credentials at risk. Here’s a quick rundown of what you should know about OAuth 2.0.
Attackers are impersonating local credit unions to capture personal information and extract money, says Avanan.
A release from the Cybersecurity Advisory outlines what organizations should be on the lookout for when it comes to a Russian cybersecurity attack.
Set your device into kiosk mode and pass it around without worrying about someone opening other apps or accessing unwanted content through an accessibility feature called Guided Access.
An infamous North Korean state-sponsored threat actor is hitting several organizations in the blockchain and cryptocurrencies industries. Learn how to protect yourself.
Encrypt your data and browse the web privately with VPNCity.
Your home needs protection. This inexpensive security camera can help.
Attackers focused on the cloud are using more sophisticated tactics to aim at Kubernetes and the software supply chain, says Aqua Security.
A Techstrong Research study of 531 IT professionals found that teams worry about losing IP to hyperscale cloud providers.
Phishing attacks aimed at stealing LinkedIn account credentials surged during the first quarter of 2022, says Check Point Research.
International law firm RPC found the rate of ransomware attacks are spiking, leading to more sensitive information being jeopardized.
Some 75% of SMBs polled in a CyberCatch survey said they’d be able to survive only three to seven days following a ransomware attack.
A recently discovered set of malicious tools allows state-sponsored attackers to target critical infrastructures in the US. See what you should do to protect yourself from this new threat.
Samsung and Oxford Economics study explores how BYOD vs EPD policies can impact SMBs.