Security  List -  2024  2023  2021  2020  2019  2018

DATE

NAME

Info

CATEG.

WEB

28.9.24

Automattic blocks WP Engine’s access to WordPress resourcesWordPress.org has banned WP Engine from accessing its resources and stopped delivering plugin updates to websites hosted on the platform, urging impacted users to choose other hosting providers.SecurityBleepingComputer

25.9.24

Mozilla Faces Privacy Complaint for Enabling Tracking in Firefox Without User ConsentVienna-based privacy non-profit noyb (short for None Of Your Business) has filed a complaint with the Austrian data protectionSecurityThe Hacker News

24.9.24

Kaspersky Exits U.S., Automatically Replaces Software With UltraAV, Raising ConcernsAntivirus vendor Kaspersky has formally begun pulling back its offerings in the U.S., migrating existing users to UltraAV, effectiveSecurityThe Hacker News

24.9.24

Kaspersky deletes itself, installs UltraAV antivirus without warningStarting Thursday, Kaspersky deleted its anti-malware software from computers across the United States and replaced it with UltraAV's antivirus solution without warning.Security

BleepingComputer

21.9.24

Clickbaity or genius? 'BF cheated on you' QR codes pop up across UKA new wave of QR codes has popped up across UK claiming to share a video of a boyfriend who "cheated" on a girl named Emily last night. Clickbaity or genius?Security

BleepingComputer

21.9.24

Tor says it’s "still safe" amid reports of police deanonymizing usersThe Tor Project is attempting to assure users that the network is still safe after a recent investigative report warned that law enforcement from Germany and other countries are working together to deanonymize users through timing attacks.Security

BleepingComputer

20.9.24

Over 1,000 ServiceNow instances found leaking corporate KB dataOver 1,000 misconfigured ServiceNow enterprise instances were found exposing Knowledge Base (KB) articles that contained sensitive corporate information to external users and potential threat actors.Security

BleepingComputer

14.9.24

Navigating Endpoint Privilege Management: Insights for CISOs and AdminsUnderstanding endpoint privilege management is key to defending organizations from advanced attacks. Learn more from ThreatLocker on using endpoint privilege management to better secure your org's systems.Security

BleepingComputer

14.9.24

Flipper Zero releases Firmware 1.0 after three years of developmentAfter three years of development, the Flipper Zero team has announced the release of the first major firmware version for the portable, customizable digital hacking device.Security

BleepingComputer

12.9.24

WordPress Mandates Two-Factor Authentication for Plugin and Theme DevelopersWordPress.org has announced a new account security measure that will require accounts with capabilities to update plugins and themesSecurityThe Hacker News

8.9.24

Microsoft Office 2024 to disable ActiveX controls by defaultAfter Office 2024 launches in October, Microsoft will disable ActiveX controls by default in Word, Excel, PowerPoint, and Visio client apps.Security

BleepingComputer

8.9.24

Microsoft removes revenge porn from Bing search using new toolMicrosoft announced today that it has partnered with StopNCII to proactively remove harmful intimate images and videos from Bing using digital hashes people create from their sensitive media.Security

BleepingComputer

24.8.24

Phrack hacker zine publishes new edition after three yearsPhrack #71 has been released online and is available to read for free. This issue is the first to be released since 2021, marking a new chapter in the influential online magazine's history.Security

BleepingComputer

21.8.24

GitHub Actions artifacts found leaking auth tokens in popular projectsMultiple high-profile open-source projects, including those from Google, Microsoft, AWS, and Red Hat, were found to leak GitHub authentication tokens through GitHub Actions artifacts in CI/CD workflows.Security

BleepingComputer

11.8.24

Microsoft 365 anti-phishing feature can be bypassed with CSSResearchers have demonstrated a method to bypass an anti-phishing measure in Microsoft 365 (formerly Office 365), elevating the risk of users opening malicious emails.`Security

BleepingComputer

9.8.24

Crowdstrike: Delta Air Lines refused free help to resolve IT outageThe legal spars between Delta Air Lines and CrowdStrike are heating up, with the cybersecurity firm claiming that Delta's extended IT outage was caused by poor disaster recovery plans and the airline refusing to accept free onsite help in restoring Windows devices.Security

BleepingComputer

9.8.24

Countdown is on: Last chance for discount registration at Mandiant’s mWISE 2024There is only a few days left to get $300 off the standard conference price at mWISE. Learn more from mWise 2024 about how to get the discount and the upcoming cybersecurity sessions.Security

BleepingComputer

7.8.24

CrowdStrike Reveals Root Cause of Global System OutagesCybersecurity company CrowdStrike has published its root cause analysis detailing the Falcon Sensor software update crash thatSecurityThe Hacker News

4.8.24

DigiCert to delay cert revocations for critical infrastructureDigiCert urges critical infrastructure operators to request a delay if they cannot reissue their certificates, as required by an ongoing certificate mass-revocation process announced on Tuesday.Security

BleepingComputer

27.7.24

Google Chrome now asks for passwords to scan protected archivesGoogle Chrome now warns when downloading risky password-protected files and provides improved alerts with more information about potentially malicious downloaded files.Security

BleepingComputer

26.7.24

Google rolls back decision to kill third-party cookies in ChromeGoogle has scrapped its plan to kill third-party cookies in Chrome and will instead introduce a new browser experience to allows users to limit how these cookies are used.Security

BleepingComputer

25.7.24

CrowdStrike Explains Friday Incident Crashing Millions of Windows DevicesCybersecurity firm CrowdStrike on Wednesday blamed an issue in its validation system for causing millions of Windows devices to crashSecurityThe Hacker News

23.7.24

Google Abandons Plan to Phase Out Third-Party Cookies in ChromeGoogle on Monday abandoned plans to phase out third-party tracking cookies in its Chrome web browser more than four yearsSecurityThe Hacker News

22.7.24

Microsoft releases Windows repair tool to remove CrowdStrike driverMicrosoft has released a custom WinPE recovery tool to find and remove the faulty CrowdStrike update that crashed an estimated 8.5 million Windows devices on Friday.Security

BleepingComputer

20.7.24

CrowdStrike update crashes Windows systems, causes outages worldwideA faulty component in the latest CrowdStrike Falcon update is crashing Windows systems, impacting various organizations and services across the world, including airports, TV stations, and hospitals.Security

BleepingComputer

20.7.24

Exchange Online adds Inbound DANE with DNSSEC for security boostMicrosoft is rolling out inbound SMTP DANE with DNSSEC for Exchange Online in public preview, a new capability to boost email integrity and security.Security

BleepingComputer

19.7.24

Faulty CrowdStrike Update Crashes Windows Systems, Impacting Businesses WorldwideBusinesses across the world have been hit by widespread disruptions to their Windows workstations stemming from a faultySecurity

The Hacker News

18.7.24

June Windows Server updates break Microsoft 365 Defender featuresMicrosoft has confirmed that Windows Server updates from last month's Patch Tuesday break some Microsoft 365 Defender features that use the network data reporting service.Security

BleepingComputer

15.7.24

Banks in Singapore to phase out one-time passwords in 3 monthsThe Monetary Authority of Singapore (MAS) has announced a new requirement impacting all major retail banks in the country to phase out the use of one-time passwords (OTPs) within the next three months.Security

BleepingComputer

15.7.24

Singapore Banks to Phase Out OTPs for Online Logins Within 3 MonthsRetail banking institutions in Singapore have three months to phase out the use of one-time passwords (OTPs) for authenticationSecurityThe Hacker News

14.7.24

Google increases bug bounty rewards five times, up to $151KGoogle has announced a fivefold increase in payouts for bugs found in its systems and applications reported through its Vulnerability Reward Program, with a new maximum bounty of $151,515 for a single security flaw.Security

BleepingComputer

5.7.24

Proton launches free, privacy-focused Google Docs alternativeProton has launched 'Docs in Proton Drive,' a free and open-source end-to-end encrypted web-based document editing and collaboration tool.Security

BleepingComputer

5.7.24

Google now pays $250,000 for KVM zero-day vulnerabilitiesGoogle has launched kvmCTF, a new vulnerability reward program (VRP) first announced in October 2023 to improve the security of the Kernel-based Virtual Machine (KVM) hypervisor that comes with $250,000 bounties for full VM escape exploits.Security

BleepingComputer

2.7.24

Google Chrome to let Isolated Web App access sensitive USB devicesGoogle is working on a new Unrestricted WebUSB feature, which allows trusted isolated web apps to bypass security restrictions in the WebUSB API.Security

BleepingComputer

30.6.24

Google to Block Entrust Certificates in Chrome Starting November 2024Google has announced that it's going to start blocking websites that use certificates from Entrust starting around November 1, 2024, in itsSecurityThe Hacker News

29.6.24

Polyfill claims it has been 'defamed', returns after domain shut downThe owners of Polyfill.io have relaunched the JavaScript CDN service on a new domain after polyfill.io was shut down as researchers exposed it was delivering malicious code on upwards of 100,000 websites.. The Polyfill service claims that it has been "maliciously defamed" and been subject to "media messages slandering Polyfill."Security

BleepingComputer

29.6.24

Cloudflare: We never authorized polyfill.io to use our nameCloudflare, a lead provider of content delivery network (CDN) services, cloud security, and DDoS protection has warned that it has not authorized the use of its name or logo on the Polyfill.io website, which has recently been caught injecting malware on more than 100,000 websites in a significant supply chain attack.Security

BleepingComputer

16.6.24Microsoft: New Outlook security changes coming to personal accountsMicrosoft has announced new cybersecurity enhancements for Outlook personal email accounts as part of its 'Secure Future Initiative,' including the deprecation of basic authentication (username + password) by September 16, 2024.Security

BleepingComputer

16.6.24Mozilla Firefox can now secure access to passwords with device credentialsMozilla Firefox finally allows you to further protect local access to stored credentials in the browser's password manager using your device's login, including a password, fingerprint, pin, or other biometricsSecurity

BleepingComputer

15.6.24AWS adds passkeys support, warns root users must enable MFAAmazon Web Services (AWS) has introduced FIDO2 passkeys as a new method for multi-factor authentication (MFA) to enhance account security and usability.Security

BleepingComputer

14.6.24Google's Privacy Sandbox Accused of User Tracking by Austrian Non-ProfitGoogle's plans to deprecate third-party tracking cookies in its Chrome web browser with Privacy Sandbox has run into fresh troubleSecurityThe Hacker News
9.6.24LastPass says 12-hour outage caused by bad Chrome extension updateLastPass says its almost 12-hour outage yesterday was caused by a bad update to its Google Chrome extension.Security

BleepingComputer

8.6.24Google Chrome reduced cookie requests to improve performanceGoogle shared details on a recently introduced Chrome feature that changes how cookies are requested, with early tests showing increased performance across all platforms.Security

BleepingComputer

8.6.24Microsoft deprecates Windows NTLM authentication protocolMicrosoft has officially deprecated NTLM authentication on Windows and Windows servers, stating that developers should transition to Kerberos or Negotiation authentication to prevent problems in the future.Security

BleepingComputer

6.6.24

Google Maps Timeline Data to be Stored Locally on Your Device for PrivacyGoogle has announced plans to store Maps Timeline data locally on users' devices instead of their Google account effective December 1,Security

The Hacker News

5.6.24

4-Step Approach to Mapping and Securing Your Organization's Most Critical AssetsYou're probably familiar with the term "critical assets". These are the technology assets within your company's IT infrastructure that areSecurityThe Hacker News
3.6.24Kaspersky releases free tool that scans Linux for known threatsKaspersky has released a new virus removal tool named KVRT for the Linux platform, allowing users to scan their systems and remove malware and other known threats for free.Security

BleepingComputer

3.6.24

Google Chrome change that weakens ad blockers begins June 3rdGoogle is continuing with its plan to phase out Manifest V2 extensions in Chrome starting in early June 2024, weakening the abilities of ad blockers.Security

BleepingComputer

29.5.24

Ad blocker users say YouTube videos are now skipping to the endMany users report that YouTube videos automatically skip to the end or muting video if they are using an ad blocker, making it impossible for them to watch the video.Security

BleepingComputer

25.5.24

LastPass is now encrypting URLs in password vaults for better securityLastPass announced it will start encrypting URLs stored in user vaults for enhanced privacy and protection against data breaches and unauthorized access.Security

BleepingComputer

25.5.24

Bitbucket artifact files can leak plaintext authentication secretsThreat actors were found breaching AWS accounts using authentication secrets leaked as plaintext in Atlassian Bitbucket artifact objects.Security

BleepingComputer

11.5.24

Zscaler takes "test environment" offline after rumors of a breachZscaler says that they discovered an exposed "test environment" that was taken offline for analysis after rumors circulated that a threat actor was selling access to the company's systems.Security

BleepingComputer

6.5.24Microsoft rolls out passkey auth for personal Microsoft accountsMicrosoft announced that Windows users can now log into their Microsoft consumer accounts using a passkey, allowing users to authenticate using password-less methods such as Windows Hello, FIDO2 security keys, biometric data (facial scans or fingerprints), or device PINs.Security

BleepingComputer

3.5.24Google Announces Passkeys Adopted by Over 400 Million AccountsGoogle on Thursday announced that passkeys are being used by over 400 million Google accounts, authenticating users moreSecurityThe Hacker News
30.4.24Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVMIt comes as no surprise that today's cyber threats are orders of magnitude more complex than those of the past. And the ever-SecurityThe Hacker News
27.4.24Google Meet opens client-side encrypted calls to non Google usersGoogle is updating the client-side encryption mechanism for Google Meet to allow external participants, including those without Google accounts, to join encrypted calls.Security

BleepingComputer

26.4.24Google Postpones Third-Party Cookie Deprecation Amid U.K. Regulatory ScrutinyGoogle has once again pushed its plans to deprecate third-party tracking cookies in its Chrome web browser as it works to addressSecurityThe Hacker News
17.4.24UK e-visa rollout starts today for millions: no more physical immigration cardsStarting today, millions living in the UK will receive email invitations to sign up for an e-visa account that will replace their physical immigration documents like Biometric Residence Permits (BRPs). The move is, according to the Home Office, "a key step in creating a modernised and digital border."Security

BleepingComputer

17.4.24Google to crack down on third-party YouTube apps that block adsYouTube announced yesterday that third-party applications that block ads while watching YouTube videos violates its Terms of Service (ToS), and it will soon start taking action against the apps.Security

BleepingComputer

16.4.24OpenJS Foundation Targeted in Potential JavaScript Project Takeover AttemptSecurity researchers have uncovered a "credible" takeover attempt targeting the OpenJS Foundation in a manner that evokesSecurityThe Hacker News
16.4.24AWS, Google, and Azure CLI Tools Could Leak Credentials in Build LogsNew cybersecurity research has found that command-line interface (CLI) tools from Amazon Web Services (AWS) and Google CloudSecurityThe Hacker News
16.4.24OpenTable won't add first names, photos to old reviews after backlashOpenTable has reversed its decision to show members' first names and profile pictures in past anonymous reviews after receiving backlash from members who felt it was a breach of privacy.SecurityBleepingComputer
13.4.24Chrome Enterprise gets Premium security but you have to pay for itGoogle has announced a new version of its browser for organizations, Chrome Enterprise Premium, which comes with extended security controls for a monthly fee per user.Security

BleepingComputer

13.4.24Google Workspace rolls out multi-admin approval feature for risky changesGoogle is rolling out a new Workspace feature that requires multiple admins to approve high-risk setting changes to prevent unauthorized or accidental modifications that could reduce security.Security

BleepingComputer

11.4.24Implementing container security best practices using WazuhMaintaining visibility into container hosts, ensuring best practices, and conducting vulnerability assessments are necessary to ensure effective security. In this article Wazuh explores how its software can help implement best security practices for containerized environments.Security

BleepingComputer

4.4.24Google agrees to delete Chrome browsing data of 136 million usersGoogle has agreed to delete billions of data records collected from 136 million Chrome users in the United States, as part of a lawsuit settlement regarding alleged undisclosed browser data collection while in Incognito mode.Security

BleepingComputer

2.4.24Google to Delete Billions of Browsing Records in 'Incognito Mode' Privacy Lawsuit SettlementGoogle has agreed to purge billions of data records reflecting users' browsing activities to settle a class action lawsuit that claimed theSecurityThe Hacker News
24.3.24Opera sees big jump in EU users on iOS, Android after DMA updateOpera has reported a substantial 164% increase in new European Union users on iOS devices after Apple introduced a new feature to comply with the EU's Digital Markets Act (DMA).Security

BleepingComputer

23.3.24Flipper Zero makers respond to Canada’s ‘harmful’ ban proposalThe makers of Flipper Zero have responded to the Canadian government's plan to ban the device in the country, arguing that it is wrongfully accused of facilitating car thefts.Security

BleepingComputer

23.3.24Misconfigured Firebase instances leaked 19 million plaintext passwordsThree cybersecurity researchers discovered close to 19 million plaintext passwords exposed on the public internet by misconfigured instances of Firebase, a Google platform for hosting databases, cloud computing, and app development.Security

BleepingComputer

16.3.24Former telecom manager admits to doing SIM swaps for $1,000A former manager at a telecommunications company in New Jersey pleaded guilty to conspiracy charges for accepting money to perform unauthorized SIM swaps that enabled an accomplice to hack customer accounts.Security

BleepingComputer

16.3.24McDonald's IT systems outage impacts restaurants worldwideMcDonald's restaurants are suffering global IT outages that prevent employees from taking orders and accepting payments, causing some stores to close for the day.Security

BleepingComputer

16.3.24Tech support firms Restoro, Reimage fined $26 million for scare tacticsTech support companies Restoro and Reimage will pay $26 million to settle charges that they used scare tactics to trick their customers into paying for unnecessary computer repair services.Security

BleepingComputer

15.3.24Google Introduces Enhanced Real-Time URL Protection for Chrome UsersGoogle on Thursday announced an enhanced version of Safe Browsing to provide real-time, privacy-preserving URL protection and safeguard usersSecurityThe Hacker News
13.3.24Tor’s new WebTunnel bridges mimic HTTPS traffic to evade censorshipThe Tor Project officially introduced WebTunnel, a new bridge type specifically designed to help bypass censorship targeting the Tor network by hiding connections in plain sight.Security

BleepingComputer

13.3.24Google paid $10 million in bug bounty rewards last yearGoogle awarded $10 million to 632 researchers from 68 countries in 2023 for finding and responsibly reporting security flaws in the company's products and services.Security

BleepingComputer

13.3.24Tuta Mail adds new quantum-resistant encryption to protect emailTuta Mail has announced TutaCrypt, a new post-quantum encryption protocol to secure communications from powerful and anticipated decryption attacks.Security

BleepingComputer

6.3.24Passwords are Costing Your Organization Money - How to Minimize Those CostsGetting rid of passwords completely isn't a realistic option for most orgs, but there are things you can do to make them more secure. Learn more from Specops Software on maximizing security while mitigating costs.Security

BleepingComputer

3.3.24News farm impersonates 60+ major outlets: BBC, CNN, CNBC, Guardian...BleepingComputer has discovered a content farm operating some 60+ domains named after popular media outlets, including the BBC, CNBC, CNN, Forbes, Huffington Post, The Guardian, and Washington Post, among others. These sites build SEO for their online gambling ventures and sell "press release" slots at hefty prices.Security

BleepingComputer

3.3.24GitHub enables push protection by default to stop secrets leakGitHub has enabled push protection by default for all public repositories to prevent accidental exposure of secrets such as access tokens and API keys when pushing new code.Security

BleepingComputer

1.3.24GitHub Rolls Out Default Secret Scanning Push Protection for Public RepositoriesGitHub on Thursday announced that it's enabling secret scanning push protection by default for all pushes to public repositories. "This means thatSecurityThe Hacker News
29.2.24PayPal files patent for new method to detect stolen cookiesPayPal has filed a patent application for a novel method that can identify when "super-cookie" is stolen, which could improve the cookie-based authentication mechanism and limit account takeover attacks.Security

BleepingComputer

25.2.24RCMP investigating cyber attack as its website remains downThe Royal Canadian Mounted Police (RCMP), Canada's national police force has disclosed that it recently faced a cyber attack targeting its networks. The federal body has started its criminal investigation into the matter as it works to determine the scope of the security breach.Security

BleepingComputer

25.2.24Apple adds PQ3 quantum-resistant encryption to iMessageApple is adding to the iMessage instant messaging service a new post-quantum cryptographic protocol named PQ3, designed to defend encryption from quantum attacks.Security

BleepingComputer

23.2.24New Google Chrome feature blocks attacks against home networksGoogle is testing a new feature to prevent malicious public websites from pivoting through a user's browser to attack devices and services on internal, private networks.Security

BleepingComputer

23.2.24Wyze investigating 'security issue' amid ongoing outageWyze Labs is investigating a security issue while experiencing a service outage that has been causing connectivity issues since this morning.Security

BleepingComputer

23.2.24Apple Unveils PQ3 Protocol - Post-Quantum Encryption for iMessageApple has announced a new post-quantum cryptographic protocol called PQ3 that it said will be integrated into iMessage to secure the messagingSecurityThe Hacker News
18.2.24DuckDuckGo browser gets end-to-end encrypted sync featureThe DuckDuckGo browser has unveiled a new end-to-end encrypted Sync & Backup feature that lets users privately and securely synchronize their bookmarks, passwords, and Email Protection settings across multiple devices.Security

BleepingComputer

17.2.245 Steps to Improve Your Security Posture in Microsoft TeamsMicrosoft Teams is susceptible to a growing number of cybersecurity threats as its massive user base is an attractive target for cybercriminals. Learn more from Adaptive Shield on how to increase your Microsoft Teams security posture.Security

BleepingComputer

10.2.24Canada to ban the Flipper Zero to stop surge in car theftsThe Canadian government plans to ban the Flipper Zero and similar devices after tagging them as tools thieves can use to steal cars.Security

BleepingComputer

10.2.24Microsoft: Outlook clients not syncing over Exchange ActiveSyncMicrosoft warned Outlook for Microsoft 365 users that clients might have issues connecting to email servers via Exchange ActiveSync after a January update.Security

BleepingComputer

9.2.24How to Apply Zero Trust to your Active DirectoryWith cyberattacks happening everyday, how can we apply zero trust principles towards keeping our Active Directory secure? Learn more from Specops Software on how to apply zero trust principles.Security

BleepingComputer

4.2.24Check if you're in Google Chrome's third-party cookie phaseout testGoogle has started testing the phasing out of third-party cookies on Chrome, affecting about 1% of its users or approximately 30 million people. Learn how to check if you are part of the initial test.Security

BleepingComputer

2.2.24

Microsoft says Outlook apps can’t connect to Outlook.comMicrosoft is investigating an issue that prevents Outlook and other email clients from connecting when using an Outlook.com account.Security

BleepingComputer

1.2.24

Role of Wazuh in building a robust cybersecurity architectureLeveraging open source solutions and tools to build a cybersecurity architecture offers organizations several benefits. Learn more from Wazuh about the benefits of open source solutions.Security

BleepingComputer

1.2.24How to secure AD passwords without sacrificing end-user experienceTo increase password security, regulatory bodies recommend longer and unique passwords. Despite this, many still stick to using the same easy-to-guess passwords for the sake of convenience.Security

BleepingComputer

26.1.24

Perfecting the Defense-in-Depth Strategy with AutomationMedieval castles stood as impregnable fortresses for centuries, thanks to their meticulous design. Fast forward to the digital age, and this medieval wisdomSecurityThe Hacker News

20.1.24

Haier hits Home Assistant plugin dev with takedown noticeAppliances giant Haier reportedly issued a takedown notice to a software developer for creating Home Assistant integration plugins for the company's home appliances and releasing them on GitHub.Security

BleepingComputer

20.1.24

Have I Been Pwned adds 71 million emails from Naz.API stolen account listHave I Been Pwned has added almost 71 million email addresses associated with stolen accounts in the Naz.API dataset to its data breach notification service.Security

BleepingComputer

19.1.24

Latest Adblock update causes massive YouTube performance hitAdblock and Adblock Plus users report performance issues on YouTube, initially blamed on Google but later determined to be an issue in the popular ad-blocking extension.Security

BleepingComputer

12.1.24

Bitwarden adds passkey support to log into web password vaultsThe open-source Bitwarden password manager has announced that all users can now log in to their web vaults using a passkey instead of the standard username and password pairs.Security

BleepingComputer

12.1.24

Unifying Security Tech Beyond the Stack: Integrating SecOps with Managed Risk and StrategyCybersecurity is an infinite journey in a digital landscape that never ceases to change. According to Ponemon Institute 1 , "only 59% of organizations saySecurityThe Hacker News

11.1.24

Criminal IP and Tenable Partner for Swift Vulnerability DetectionCyber Threat Intelligence (CTI) search engine Criminal IP has established a technical partnership with Tenable. Learn more from Criminal IP about how this partnership can assist in real-time vulnerability and maliciousness scans.Security

BleepingComputer

7.1.24

Unifying Security Tech Beyond the Stack: Integrating SecOps with Managed Risk and StrategyCybersecurity is an infinite journey in a digital landscape that never ceases to change. According to Ponemon Institute1, "only 59% of organizations say theirSecurityThe Hacker News

4.1.24

PornHub blocks North Carolina, Montana over new age verification lawsAdult media giant Aylo has blocked access to many of its websites, including PornHub, to visitors from Montana and North Carolina as new age verifications laws go into effect.Security

BleepingComputer

4.1.24

Steam drops support for Windows 7 and 8.1 to boost securitySteam is no longer supported on Windows 7, Windows 8, and Windows 8.1 as of January 1, with the company recommending users upgrade to a newer operating system.Security

BleepingComputer

4.1.24

The biggest cybersecurity and cyberattack stories of 20232023 was a big year for cybersecurity, with significant cyberattacks, data breaches, new threat groups emerging, and, of course, zero-day vulnerabilities.Security

BleepingComputer

3.1.24

Google Settles $5 Billion Privacy Lawsuit Over Tracking Users in 'Incognito Mode'Google has agreed to settle a lawsuit filed in June 2020 that alleged that the company misled users by tracking their surfing activity who thought..Security

The Hacker News