Your data was found online if you bought the company's products since 2017.
Dell has confirmed the data leak of about 49 million customers who purchased the company's products since 2017.
The incident affected the Dell portal, which contained information about customer purchases. Among the...
Vulnerabilities in modems allow you to bypass security measures and take possession of someone else's device.
Dangerous vulnerabilities in Telit Cinterion cellular modems allow attackers to remotely execute arbitrary code using SMS messages.
8 different vulnerabilities were identified, 7 of...
Cryptographic attacks are sweeping the world like a tsunami. In Russia, companies with previously compromised credentials are more likely to fall under the wave. Another situation is when victims used publicly available applications with vulnerabilities, such as Microsoft Exchange. If the first...
In this new article, read expert advice on protecting against cyber attacks through third-party code repositories.
At the end of 2023, an article titled "One Attack on the Supply Chain to rule everyone" appeared on the Internet, which described a way to gain access to the GitHub repository...
A new chip for machine learning will prevent hacking and change the design of devices.
MIT developed a new type of machine learning accelerator that is resistant to the most common types of attacks. The device allows you to safely process health applications on smartphones, without sacrificing...
The closure of the plasma empire has jeopardized drug development.
Medical company Octapharma Plasma has faced a major problem in its IT infrastructure, which has led to the closure of more than 150 blood plasma collection centers in the United States.
A banner appeared on the company's...
"You'll like it" is a phrase that you should be wary of in Telegram.
Cybercriminals started hacking Telegram accounts using thematic sites with images, analysts of the Solar Group of companies said.
Employees of the Solar AURA external digital threat monitoring center found more than 300...
In the coming years, AI will become the most experienced cybercriminal on Earth.
Scientists from the University of Illinois at Urbana-Champaign recently published a study in which they proved that the GPT-4 artificial intelligence model from OpenAI is able to independently exploit...
Now the privacy of Omni Hotels guests depends on the generosity of management.
The Daixin Team cybercrime group has claimed responsibility for a recent attack on the Omni Hotels & Resorts chain and is threatening to release confidential customer information if the ransom is not paid.
Omni...
Compromising the supply chain can affect critical infrastructure.
The CISA took control of the situation around the data security breach of the American company Sisense, specializing in business intelligence. The incident had a significant impact on critical infrastructure organizations...
HHS teaches health care support services not to be too trusting.
The U.S. Department of Health and Human Services (HHS) is warning health care providers and insurance companies about a new threat. According to the Health Sector Cybersecurity Coordination Center (HC3), attackers are increasingly...
The NYT is not giving up in the battle with OpenAI for copyright content.
The New York Times responded to OpenAI's claims that the publication allegedly used ChatGPT hacking methods to prepare a lawsuit against OpenAI. The publication categorically rejects OpenAI's accusations, describing them...
Should device owners worry and who is actually behind the attack?
The network reported that Anycubic 3D printers connected to the Internet were hacked in order to warn users about a critical vulnerability of the devices. The hacker added a file called " hacked_machine_readme.gcode", which...
A clear example of how non-updated software harms user security.
Cybercriminals use an outdated CMS content editor that was discontinued 14 years ago to manipulate search results and direct users to malicious sites or fraudulent resources.
The main tactic of attackers is to use so-called open...
The leak of 2.5 million records casts a shadow on the reputation of the international airport.
A well-known hacker under the pseudonym IntelBroker, responsible for hacking General Electric, Hewlett Packard Enterprise and DC Health Link , claims that this time he managed to break into the...
Apple thanked the hacker arrested for hacking the company's systems.
A cybersecurity researcher who previously reported several vulnerabilities in Apple products is accused of breaking into Apple's internal infrastructure and defrauding the corporation of $2.5 million through gift cards and...
What does the company expect if its data becomes publicly available?
The British company Lush, a well-known global manufacturer of cosmetics and bath bombs, was subjected to a cyber attack. Hacker group Akira claimed responsibility for the attack, saying it stole 110 GB of data, including...
The team at cross-chain bridge aggregator Socket reported an attack that resulted in the protocol losing $3.3 million.
“There was a security incident at Socket that affected infinite contract approval wallets. We have identified the issue and have suspended the affected contracts,” the...
Cross-chain decentralized lending protocol Radiant Capital has confirmed the hack of a new liquidity pool based on the Arbitrum network. Hackers managed to withdraw 1,900 ETH (about $4.5 million).
According to blockchain security company PeckShield, attackers took advantage of a known...
According to a report provided by CloudSEK, a new hacking method allows attackers to exploit the functionality of the OAuth 2.0 authorization protocol to compromise Google accounts. This method allows you to maintain valid sessions by regenerating cookies, even after changing your IP address or...