<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=694598870919452&amp;ev=PageView&amp;noscript=1">
Jan 22

Threat Intelligence: Adware Installers Using Rumba Variant STOP

Photo credit: Pixabay

read more →
Jan 21

Threat Intelligence: WordPress Plugin WPML Hacked

Photo Credit: www.pixabay.com

read more →
Jan 14

Threat Intelligence: Nine Adware Apps Discovered on Play Store

Photo Credit: https://www.androidpolice.com

read more →
Jan 11

Threat Intelligence: Government Websites Down Due to Non-Renewed TLS Certificates

Photo by Jomar on Unsplash

read more →
Jan 07

Threat Intelligence: Yokagawa Severe Vulnerability

Photo Credit: www.yokogawa.com

read more →
Dec 28

Binary Defense Predictions for 2019

Photo Credit: Kevin Ku via Unsplash

read more →
Dec 27

Threat Intelligence: Netflix Phishing Scam

Photo Credit: Federal Trade Commision

read more →
Dec 27

Threat Intelligence: Customer Information Exposed in Caribou Coffee Data Breach

Image by Getty Images

read more →
Dec 19

Threat Intelligence: NASA Hit With Data Breach

Current and former employees of NASA from July 2006 through October 2018 could have been affected by a data breach, but the exact number is not known at this time. A server containing 
PII (Personally Identifiable Information) of employee’s was discovered to have been hacked on October 23rd. Cybersecurity personnel belonging to NASA immediately began securing the server that had been breached to prevent any further information from being compromised. Federal cybersecurity acquaintances have also been called in to help determine how the breach happened, and what information was accessed.

read more →
Dec 17

Threat Intelligence: ZipRecruiter Suffers Data Breach

The issue is with part of ZipRecruiter's site that enables a business with authorization to access the CV database to contact the person seeking a job. After an employer gets online and accesses a resume, they can decide to shortlist some of the candidates when they are provided with a candidate form. The problem is that unauthorized users are able to access the form while not having access to the CV database.

read more →