Cybersecurity Blog
The Definitive Enterprise Browser Buyer’s Guide
Jan 02, 2024The Hacker NewsBrowser Security / Threat Protection Security stakeholders have come to realize that the ...
Google Settles $5 Billion Privacy Lawsuit Over Tracking Users in ‘Incognito Mode’
Jan 02, 2024NewsroomData Privacy / Online Tracking Google has agreed to settle a lawsuit filed in June 2020 that ...
Palo Alto Networks Closes Talon Cyber Security Acquisition
PRESS RELEASE SANTA CLARA, Calif., Dec. 28, 2023 /PRNewswire/ — Palo Alto Networks (NASDAQ: PANW), the global ...
Clash of Clans gamers at risk while using third-party app
Clash of Clans gamers at risk while using third-party app Pierluigi Paganini December 29, 2023 An exposed database and ...
Hospitals Ask Courts to Force Cloud Storage Firm to Return Stolen Data
Two New York hospitals are seeking a court order to retrieve stolen data stored on a cloud storage company’s ...
Cybercriminals launched ‘Leaksmas’ event in the Dark Web exposing massive volumes of leaked PII and compromised data
Cybercriminals launched “Leaksmas” event in the Dark Web exposing massive volumes of leaked PII and compromised data ...
Misconfigurations in Google Kubernetes Engine (GKE) Lead to a Privilege Escalation Exploit Chain
A recent Unit 42 investigation revealed a dual privilege escalation chain impacting Google Kubernetes Engine (GKE). This ...
New Variant of DLL Search Order Hijacking Bypasses Windows 10 and 11 Protections
Jan 01, 2024NewsroomWindows Security / Vulnerability Security researchers have detailed a new variant of a dynamic ...