ZAGG Inc. is informing customers that their credit card data has been exposed to unauthorized individuals after hackers compromised a third-party application provided by the company’s e-commerce provider, BigCommerce. […] Go to Source Author: Bill Toulas
Category Archives: Security
Volkswagen’s automotive software company, Cariad, exposed data collected from around 800,000 electric cars. The info could be linked to drivers’ names and reveal precise vehicle locations. […] Go to Source Author: Ionut Ilascu
A White House official has added a ninth U.S. telecommunications company to the list of telecoms breached in a Chinese hacking campaign that impacted dozens of countries. […] Go to Source Author: Sergiu Gatlan
Palo Alto Networks is warning that hackers are exploiting the CVE-2024-3393 denial of service vulnerability to disable firewall protections by forcing it to reboot. […] Go to Source Author: Bill Toulas
At least five Chrome extensions were compromised in a coordinated attack where a threat actor injected code that steals sensitive information from users. […] Go to Source Author: Bill Toulas
The Apache Software Foundation has released security updates to address three severe problems that affect MINA, HugeGraph-Server, and Traffic Control products. […] Go to Source Author: Bill Toulas
North Korean threat actors are using new malware called OtterCookie in the Contagious Interview campaign that is targeting software developers. […] Go to Source Author: Bill Toulas
Microsoft is warning of an issue when using a media support to install Windows 11, version 24H2, that causes the operating system to not accept further security updates. […] Go to Source Author: Bill Toulas
A new Mirai-based malware campaign is actively exploiting unpatched vulnerabilities in Internet of Things (IoT) devices, including DigiEver DS-2105 Pro DVRs. […] Go to Source Author: Bill Toulas
European Space Agency’s official web shop was hacked as it started to load a piece of JavaScript code that generates a fake Stripe payment page at checkout. […] Go to Source Author: Ionut Ilascu
