Browsing the "data breaches" Tag

Futurist Shara Evans | The Future of Privacy and Security

January 30th, 2020 📆 | 2207 Views ⚑

As a technology futurist, Shara spends a lot of her time speaking to audiences about the ways that technologies can

Tagged with:







Demystifying the Cloud: Applying Old Tricks to New Problems

June 26th, 2019 📆 | 6399 Views ⚑

Understand the basics of security in AWS and get a sneak peak of our newest tooling to visualize attack paths

Tagged with:




Researcher Hijacks a Microsoft Service Using Loophole in Azure Cloud Platform

April 18th, 2019 📆 | 5725 Views ⚑

A cybersecurity professional today demonstrated a long-known unpatched weakness in Microsoft’s Azure cloud service by exploiting it to take control

Tagged with:




Over 100 Million JustDial Users’ Personal Data Found Exposed On the Internet

April 17th, 2019 📆 | 4955 Views ⚑

An unprotected database belonging to JustDial, India’s largest local search service, is leaking personally identifiable information of its every customer

Tagged with:




Researcher Reveals Multiple Flaws in Verizon Fios Routers — PoC Released

April 9th, 2019 📆 | 5196 Views ⚑

A cybersecurity researcher at Tenable has discovered multiple security vulnerabilities in Verizon Fios Quantum Gateway Wi-Fi routers that could allow

Tagged with:




Unpatched Flaw in Xiaomi’s Built-in Browser App Lets Hackers Spoof URLs

April 5th, 2019 📆 | 3796 Views ⚑

EXCLUSIVE — Beware, if you are using a Xiaomi’s Mi or Redmi smartphone, you should immediately stop using its built-in

Tagged with:




NSA Releases GHIDRA Source Code — Free Reverse Engineering Tool

April 5th, 2019 📆 | 3115 Views ⚑

Update (4/4/2019) — Great news. NSA today finally released the complete source code for GHIDRA version 9.0.2 which is now

Tagged with:




In-Depth Analysis of JS Sniffers Uncovers New Families of Credit Card-Skimming Code

April 3rd, 2019 📆 | 7630 Views ⚑

In a world that’s growing increasingly digital, Magecart attacks have emerged as a key cybersecurity threat to e-commerce sites. Magecart,

Tagged with:




End-to-end attack simulation explanation for cyber security trainees

February 5th, 2019 📆 | 8486 Views ⚑

Network hacking attacks: MWR Infosecurity Principal Security Consultant Donato Capitella shows how it is done source

Tagged with: