BPC-CR-609 | With AI and automation, hackers are stealing data at unprecedented speeds | Courtesy of thehackernews.com | 25-Feb-25 |
BPC-CR-608 | Hackers can turn any Bluetooth device into an AirTag and track its location | Courtesy of thehackernews.com | 25-Feb-25 |
BPC-CR-607 | Trend Micro Fights Back Against Online Scams | Courtesy of thehackernews.com | 25-Feb-25 |
BPC-CR-606 | CISA, experts urging users to patch new Windows zero-days: “test and deploy quickly” | Courtesy of thehackernews.com | 25-Feb-25 |
BPC-CR-605 | I wanted to keep my TP-Link router but security pros roasted me | Courtesy of thehackernews.com | 25-Feb-25 |
BPC-CR-604 | CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries | Courtesy of thehackernews.com | 25-Feb-25 |
BPC-CR-603 | LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile | Courtesy of thehackernews.com | 25-Feb-25 |
BPC-CR-602 | Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware | Courtesy of thehackernews.com | 25-Feb-25 |
BPC-CR-601 | 2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RAT | Courtesy of thehackernews.com | 25-Feb-25 |
BPC-CR-600 | GitVenom Malware Steals $456K in Bitcoin Using Fake GitHub Projects to Hijack Wallets | Courtesy of thehackernews.com | 25-Feb-25 |
BPC-CR-599 | Think You're Secure? 49% of Enterprises Underestimate SaaS Risks | Courtesy of thehackernews.com | 15-Jan-25 |
BPC-CR-598 | Why Phishing-Resistant MFA Is No Longer Optional: The Hidden Risks of Legacy MFA | Courtesy of thehackernews.com | 15-Jan-25 |
BPC-CR-597 | WordPress Hunk Companion Plugin Flaw Exploited to Silently Install Vulnerable Plugins | Courtesy of thehackernews.com | 15-Jan-25 |
BPC-CR-596 | Researchers Uncover Symlink Exploit Allowing TCC Bypass in iOS and macOS | Courtesy of thehackernews.com | 15-Jan-25 |
BPC-CR-595 | Patch Alert: Critical Apache Struts Flaw Found, Exploitation Attempts Detected | Courtesy of thehackernews.com | 15-Jan-25 |
BPC-CR-594 | Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP | Courtesy of thehackernews.com | 15-Jan-25 |
BPC-CR-593 | Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation | Courtesy of thehackernews.com | 15-Jan-25 |
BPC-CR-592 | Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation | Courtesy of thehackernews.com | 15-Jan-25 |
BPC-CR-591 | How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal? | Courtesy of thehackernews.com | 15-Jan-25 |
BPC-CR-590 | Russian Star Blizzard Targets WhatsApp Accounts in New Spear-Phishing Campaign | Courtesy of thehackernews.com | 15-Jan-25 |
BPC-CR-589 | Sophos Issues Hotfixes for Critical Firewall Flaws: Update to Prevent Exploitation | Courtesy of thehackernews.com | 20-Dec-24 |
BPC-CR-588 | Hackers Exploiting Critical Fortinet EMS Vulnerability to Deploy Remote Access Tools | Courtesy of thehackernews.com | 20-Dec-24 |
BPC-CR-587 | CISA Adds Critical Flaw in BeyondTrust Software to Exploited Vulnerabilities List | Courtesy of thehackernews.com | 20-Dec-24 |
BPC-CR-586 | https://thehackernews.com/2024/12/fortinet-warns-of-critical-fortiwlm.html | Courtesy of thehackernews.com | 20-Dec-24 |
BPC-CR-585 | Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware | Courtesy of thehackernews.com | 20-Dec-24 |
BPC-CR-584 | 5 Practical Techniques for Effective Cyber Threat Hunting | Courtesy of thehackernews.com | 20-Dec-24 |
BPC-CR-583 | Researchers Uncover Espionage Tactics of China-Based APT Groups in Southeast Asia | Courtesy of thehackernews.com | 20-Dec-24 |
BPC-CR-582 | Fake Recruiters Distribute Banking Trojan via Malicious Apps in Phishing Scam | Courtesy of thehackernews.com | 20-Dec-24 |
BPC-CR-581 | The Future of Network Security: Automated Internal and External Pentesting | Courtesy of thehackernews.com | 20-Dec-24 |
BPC-CR-580 | Patch Alert: Critical Apache Struts Flaw Found, Exploitation Attempts Detected | Courtesy of thehackernews.com | 20-Dec-24 |
BPC-CR-579 | Dutch DPA Fines Netflix €4.75 Million for GDPR Violations Over Data Transparency | Courtesy of thehackernews.com | 20-Dec-24 |
BPC-CR-578 | Fortinet Warns of Critical FortiWLM Flaw That Could Lead to Admin Access Exploits | Courtesy of thehackernews.com | 20-Dec-24 |
BPC-CR-577 | Thousands Download Malicious npm Libraries Impersonating Legitimate Tools | Courtesy of thehackernews.com | 20-Dec-24 |
BPC-CR-576 | Hackers Exploiting Critical Fortinet EMS Vulnerability to Deploy Remote Access Tools | Courtesy of thehackernews.com | 20-Dec-24 |
BPC-CR-575 | VMware virtual machines under attack: hackers exploit critical vCenter Server flaw | Courtesy of the Cybernews.com | 25-Nov-24 |
BPC-CR-574 | Apple security updates address dangerous zero-day attacks | Courtesy of the Cybernews.com | 25-Nov-24 |
BPC-CR-573 | Strava’s new API agreement will destroy the app, users warn | Courtesy of the Cybernews.com | 25-Nov-24 |
BPC-CR-572 | How to safely use public Wi-Fi networks | Courtesy of the Cybernews.com | 25-Nov-24 |
BPC-CR-571 | Ensuring confidentiality in online transactions | Courtesy of the Cybernews.com | 25-Nov-24 |
BPC-CR-570 | High Severity Flaw In PostgreSQL Allows | Courtesy of thehackernews.com | 18-Nov-24 |
BPC-CR-569 | Vietnamese Hacker Group Deploys New PXA Stealer Targeting Europe and Asia | Courtesy of thehackernews.com | 18-Nov-24 |
BPC-CR-568 | Iranian Hackers Deploy Wezrat Malware | Courtesy of thehackernews.com | 18-Nov-24 |
BPC-CR-567 | Warning Deepdata Malware Exploiting | Courtesy of thehackernews.com | 18-Nov-24 |
BPC-CR-566 | How AI Is Transforming IAM And Identity Security | Courtesy of thehackernews.com | 18-Nov-24 |
BPC-CR-565 | Google leads global anti-scam initiative, establishes fraud-fighting platform | Courtesy of the Cybernews.com | 24-Oct-24 |
BPC-CR-564 | This Trojan disguises as Google Chrome or NordVPN to wipe out your accounts | Courtesy of the Cybernews.com | 24-Oct-24 |
BPC-CR-563 | New macOS vulnerability discovered: get the patch before attackers get access | Courtesy of the Cybernews.com | 24-Oct-24 |
BPC-CR-562 | Flaw crashes Apple devices with a single click, Tesla also vulnerable | Courtesy of the Cybernews.com | 24-Oct-24 |
BPC-CR-561 | Users raise alarm bells after Samsung Health makes medical records accessible on the app | Courtesy of the Cybernews.com | 24-Oct-24 |
BPC-CR-560 | Vendors responsible for almost half of breaches in the energy sector, study findsvc | Courtesy of the Cybernews.com | 24-Oct-24 |
BPC-CR-559 | First credible ransomware variant detected for Macs: creeping evolution spells danger | Courtesy of the Cybernews.com | 24-Oct-24 |
BPC-CR-558 | DDoS attacks surge to unprecedented levels, bombarding servers with 4.2Tbps | Courtesy of the Cybernews.com | 24-Oct-24 |
BPC-CR-557 | Apple announces Bug Bounty Program for its AI | Courtesy of the Cybernews.com | 24-Oct-24 |
BPC-CR-556 | Critical Windows vulnerabilities exploited: CISA urges users to update | Courtesy of the Cybernews.com | 24-Sep-24 |
BPC-CR-555 | Critical vulnerabilities found in Photoshop, Premiere Pro, and multiple other Adobe products | Courtesy of the Cybernews.com | 24-Sep-24 |
BPC-CR-554 | RansomHub releases 487GB of data allegedly stolen from Kawasaki | Courtesy of the Cybernews.com | 24-Sep-24 |
BPC-CR-553 | Chrome extension hides malware to steal crypto: new operation uncovered | Courtesy of the Cybernews.com | 24-Sep-24 |
BPC-CR-552 | Think twice before you click: this captcha might steal your money | Courtesy of the Cybernews.com | 24-Sep-24 |
BPC-CR-551 | Cashless toll payments end with massive data leak | Courtesy of the Cybernews.com | 24-Sep-24 |
BPC-CR-550 | DDoS overtakes ransomware as most active cyber threat in Europe | Courtesy of the Cybernews.com | 24-Sep-24 |
BPC-CR-549 | iPhone 16 Pro users experiencing display issues related to latest software | Courtesy of the Cybernews.com | 24-Sep-24 |
BPC-CR-548 | Apple users warned about high-risk security vulnerabilities | Courtesy of the Cybernews.com | 24-Sep-24 |
BPC-CR-547 | Combating phishing attacks through awareness and simulation | Courtesy of the Cybernews.com | 24-Sep-24 |
BPC-CR-546 | Android and iOS users targeted with novel banking app phishing campaign | Courtesy of the Cybernews.com | 22-Aug-24 |
BPC-CR-545 | Security flaws in Dahua cameras being actively exploited, CISA warns | Courtesy of the Cybernews.com | 22-Aug-24 |
BPC-CR-544 | Hackers target online shoppers in new Adobe e-commerce malware campaign | Courtesy of the Cybernews.com | 22-Aug-24 |
BPC-CR-543 | Attackers draining bank accounts using new Android card cloning malware | Courtesy of the Cybernews.com | 22-Aug-24 |
BPC-CR-542 | Chrome-stored passwords targeted by notorious ransomware group | Courtesy of the Cybernews.com | 22-Aug-24 |
BPC-CR-541 | Another critical WordPress plugin vulnerability found, over a million websites affected | Courtesy of the Cybernews.com | 22-Aug-24 |
BPC-CR-540 | Why Telegram’s out-of-the-box features don’t provide maximum security | Courtesy of the Cybernews.com | 22-Aug-24 |
BPC-CR-539 | Chinese hackers exploit flaw in software used by telecoms | Courtesy of the Cybernews.com | 22-Aug-24 |
BPC-CR-538 | Apple, TikTok, Google, and Facebook give your data to law enforcement up to 80% of the time | Courtesy of the Cybernews.com | 22-Aug-24 |
BPC-CR-537 | The Best Password Managers for 2024 | Courtesy of the Cybernews.com | 22-Aug-24 |
BPC-CR-536 | Virtual machines at risk as ransomware gangs exploit dangerous VMware vulnerability | Courtesy of the Cybernews.com | 26-Jul-24 |
BPC-CR-535 | Google being impersonated on Google Ads by scammers peddling fake Authenticator | Courtesy of the Cybernews.com | 26-Jul-24 |
BPC-CR-534 | Scammers now impersonating crypto exchanges to get access to your accounts, FBI warns | Courtesy of the Cybernews.com | 26-Jul-24 |
BPC-CR-533 | Cisco, Oracle patch warning covers hundreds of critical vulnerabilities | Courtesy of the Cybernews.com | 26-Jul-24 |
BPC-CR-532 | CrowdStrike outage turns into playground for threat actors | Courtesy of the Cybernews.com | 26-Jul-24 |
BPC-CR-531 | The CrowdStrike butterfly effect: cyber pros weigh in on the far-reaching disaster | Courtesy of the Cybernews.com | 26-Jul-24 |
BPC-CR-530 | Android Telegram users hit by zero-day exploit masquerading as “xHamster” | Courtesy of the Cybernews.com | 26-Jul-24 |
BPC-CR-529 | A secretive phishing network on GitHub is distributing malware | Courtesy of the Cybernews.com | 26-Jul-24 |
BPC-CR-528 | Chrome now asking for ZIP archive passwords to help detect malicious files | Courtesy of the Cybernews.com | 26-Jul-24 |
BPC-CR-527 | Hundreds of PC models vulnerable to boot-level attacks after vendors copypaste “secret” keys | Courtesy of the Cybernews.com | 26-Jul-24 |
BPC-CR-526 | Snap previews its real-time image model that can generate AR experiences | Courtesy of the techcrunch.com | 20-Jun-24 |
BPC-CR-525 | In spite of hype, many companies are moving cautiously when it comes to generative AI | Courtesy of the techcrunch.com | 20-Jun-24 |
BPC-CR-524 | Fake Paris 2024 Summer Olympic Games tickets flooding the internet | Courtesy of the Cybernews.com | 20-Jun-24 |
BPC-CR-523 | Hackers now using emojis to command malware | Courtesy of the Cybernews.com | 20-Jun-24 |
BPC-CR-522 | AI will improve weather forecasting: but what about meteorologists? | Courtesy of the Cybernews.com | 20-Jun-24 |
BPC-CR-521 | YouTube copies X’s Community Notes for amateur fact-checking | Courtesy of the Cybernews.com | 20-Jun-24 |
BPC-CR-520 | OpenAI's co-founder is launching a new AI startup | Courtesy of the Cybernews.com | 20-Jun-24 |
BPC-CR-519 | What is DevSecOps and Why is it Essential for Secure Software Delivery? | Courtesy of the hackernews.com | 20-Jun-24 |
BPC-CR-518 | Signal Foundation Warns Against EU's Plan to Scan Private Messages for CSAM | Courtesy of the hackernews.com | 20-Jun-24 |
BPC-CR-517 | Researchers Uncover UEFI Vulnerability Affecting Multiple Intel CPUs | Courtesy of the hackernews.com | 20-Jun-24 |
BPC-CR-516 | How Do Hackers Blend In So Well? Learn Their Tricks in This Expert Webinar | Courtesy of the hackernews.com | 27-May-24 |
BPC-CR-515 | Beware: These Fake Antivirus Sites Spreading Android and Windows Malware | Courtesy of the hackernews.com | 27-May-24 |
BPC-CR-514 | TP-Link Gaming Router Vulnerability Exposes Users to Remote Code Attacks | Courtesy of the hackernews.com | 27-May-24 |
BPC-CR-513 | WordPress Plugin Exploited to Steal Credit Card Data from E-commerce Sites | Courtesy of the hackernews.com | 27-May-24 |
BPC-CR-512 | Update Chrome Browser Now: 4th Zero-Day Exploit Discovered in May 2024 | Courtesy of the hackernews.com | 27-May-24 |
BPC-CR-511 | The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield | Courtesy of the hackernews.com | 15-May-24 |
BPC-CR-510 | Microsoft Outlook Flaw Exploited by Russia's APT28 to Hack Czech, German Entities | Courtesy of the hackernews.com | 15-May-24 |
BPC-CR-509 | New Case Study: The Malicious Comment | Courtesy of the hackernews.com | 15-May-24 |
BPC-CR-508 | Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw | Courtesy of the hackernews.com | 15-May-24 |
BPC-CR-507 | Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days | Courtesy of the hackernews.com | 15-May-24 |
BPC-CR-506 | Macrosoft exposes private data of license buyers | Courtesy of the Cybernews.com | 20-Apr-24 |
BPC-CR-505 | Number of cyberattacks jumps to new record | Courtesy of the Cybernews.com | 20-Apr-24 |
BPC-CR-504 | Brute force attacks targeting VPNs on the rise, intel warning | Courtesy of the Cybernews.com | 20-Apr-24 |
BPC-CR-503 | https://thehackernews.com/2024/04/beware-githubs-fake-popularity-scam.html | Courtesy of the hackernews.com | 20-Apr-24 |
BPC-CR-502 | Fortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability | Courtesy of the hackernews.com | 20-Apr-24 |
BPC-CR-501 | Sneaky Credit Card Skimmer Disguised as Harmless Facebook Tracker | Courtesy of the hackernews.com | 20-Apr-24 |
BPC-CR-500 | AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs | Courtesy of the hackernews.com | 20-Apr-24 |
BPC-CR-499 | Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor | Courtesy of the hackernews.com | 20-Apr-24 |
BPC-CR-498 | Network Threats: A Step-by-Step Attack Demonstration | Courtesy of the hackernews.com | 20-Apr-24 |
BPC-CR-497 | Cisco Warns of Global Surge in Brute-Force Attacks Targeting VPN and SSH Services | Courtesy of the hackernews.com | 20-Apr-24 |
BPC-CR-496 | NIST National Vulnerability Database Disruption Sees CVE Enrichment on Hold | Courtesy of infosecurity-magazine.com | 21-Mar-24 |
BPC-CR-495 | Researchers Uncover New “Conversation Overflow” Tactics | Courtesy of infosecurity-magazine.com | 21-Mar-24 |
BPC-CR-494 | CISA Warns Critical Infrastructure Leaders of Volt Typhoon | Courtesy of infosecurity-magazine.com | 21-Mar-24 |
BPC-CR-493 | Google Introduces Enhanced Real-Time URL Protection for Chrome Users | Courtesy of thehackernews.com | 21-Mar-24 |
BPC-CR-492 | New 'Loop DoS' Attack Impacts Hundreds of Thousands of Systems | Courtesy of thehackernews.com | 21-Mar-24 |
BPC-CR-491 | Keyboard strokes may reveal your password – research | Courtesy of cybernews.com | 14-Mar-24 |
BPC-CR-490 | Cybercriminals obtain data of 2M customers leaked by delivery company | Courtesy of cybernews.com | 14-Mar-24 |
BPC-CR-489 | Chinese-made cars may pose national security risk, US launches probe | Courtesy of cybernews.com | 14-Mar-24 |
BPC-CR-488 | Researcher found millions 2FA codes spilling online for tech giants | Courtesy of cybernews.com | 14-Mar-24 |
BPC-CR-487 | AnyDesk Hacked: Popular Remote Desktop Software Mandates Password Reset | Courtesy of thehackernews.com | 14-Mar-24 |
BPC-CR-486 | Companies need to understand that cyber risk is business risk, says fmr. CISA director Chris Krebs | Courtesy of www.cnbc.com | 20-Feb-24 |
BPC-CR-485 | AI can ‘disproportionately’ help defend against cybersecurity threats, Google CEO Sundar Pichai says | Courtesy of www.cnbc.com | 20-Feb-24 |
BPC-CR-484 | Apple’s iMessage Is Getting Post-Quantum Encryption | Courtesy of wired.com | 20-Feb-24 |
BPC-CR-483 | AnyDesk Hacked: Popular Remote Desktop Software Mandates Password Reset | Courtesy of thehackernews.com | 20-Feb-24 |
BPC-CR-482 | OWASP Releases Security Checklist for Generative AI Deployment | Courtesy of thehackernews.com | 20-Feb-24 |
BPC-CR-481 | Fortinet Warns of Critical FortiOS SSL VPN Flaw Likely Under Active Exploitation | Courtesy of thehackernews.com | 20-Feb-24 |
BPC-CR-480 | Fake LastPass app discovered on the Apple App Store | Courtesy of cybernews.com | 20-Feb-24 |
BPC-CR-479 | The real threat to cybersecurity isn’t cybercrime, it’s burnout | Courtesy of cybernews.com | 20-Feb-24 |
BPC-CR-478 | The way to your heart is through… ChatGPT | Courtesy of cybernews.com | 20-Feb-24 |
BPC-CR-477 | Microsoft says nation-state hackers are using its AI tools | Courtesy of cybernews.com | 20-Feb-24 |
BPC-CR-476 | Chatbots used to “jailbreak” other chatbots | Courtesy of cybernews.com | 13-Jan-24 |
BPC-CR-475 | Don’t trust links with known domains: BMW affected by redirect vulnerability | Courtesy of cybernews.com | 14-Jan-24 |
BPC-CR-474 | Threat actors can “fairly easily” alter AI systems, NIST warns | Courtesy of cybernews.com | 15-Jan-24 |
BPC-CR-473 | Facebook jobs scams and how to avoid them | Courtesy of cybernews.com | 16-Jan-24 |
BPC-CR-472 | Leaked COVID tests expose sensitive patient data | Courtesy of cybernews.com | 17-Jan-24 |
BPC-CR-471 | Ransomware landscape overview 2023 | Courtesy of cybernews.com | 18-Jan-24 |
BPC-CR-470 | Cybercriminals crave cookies, not passwords | Courtesy of cybernews.com | 19-Jan-24 |
BPC-CR-469 | iPhone users: turn on new security feature | Courtesy of cybernews.com | 20-Jan-24 |
BPC-CR-468 | CISA warns Apple users to update multiple products | Courtesy of cybernews.com | 21-Jan-24 |
BPC-CR-467 | Nike and H&M most data-hungry fashion apps - report | Courtesy of cybernews.com | 22-Jan-24 |
BPC-CR-466 | Microsoft Warns of Critical Bugs Being Exploited in the Wild | Courtesy of securityweek.com | 21-Dec-23 |
BPC-CR-465 | 94 Vulnerabilities Patched in Android With December 2023 Security Updates | Courtesy of securityweek.com | 21-Dec-23 |
BPC-CR-464 | Malicious GPT Can Phish Credentials, Exfiltrate Them to External Server: Researcher | Courtesy of securityweek.com | 21-Dec-23 |
BPC-CR-463 | Apple Ships iOS 17.2 With Urgent Security Patches | Courtesy of securityweek.com | 21-Dec-23 |
BPC-CR-462 | Microsoft Adding New Security Features to Windows 11 | Courtesy of securityweek.com | 21-Dec-23 |
BPC-CR-461 | Future Intel, AMD and Arm CPUs Vulnerable to New ‘SLAM’ Attack: Researchers | Courtesy of securityweek.com | 21-Dec-23 |
BPC-CR-460 | The Reality of Cyberinsurance in 2023 | Courtesy of securityweek.com | 21-Dec-23 |
BPC-CR-459 | Urgent: New Chrome Zero-Day Vulnerability Exploited in the Wild - Update ASAP | Courtesy of thehackernews.com | 21-Dec-23 |
BPC-CR-458 | Hackers Exploiting MS Excel Vulnerability to Spread Agent Tesla Malware | Courtesy of thehackernews.com | 21-Dec-23 |
BPC-CR-457 | Decoy Microsoft Word Documents Used to Deliver Nim-Based Malware | Courtesy of thehackernews.com | 21-Dec-23 |
BPC-CR-456 | 82% of Attacks Show Cyber-Criminals Targeting Telemetry Data | Courtesy of infosecurity-magazine.com | 20-Nov-23 |
BPC-CR-455 | Cyber-Criminals Exploit Gaza Crisis With Fake Charity | Courtesy of infosecurity-magazine.com | 20-Nov-23 |
BPC-CR-454 | Microsoft Fixes Five Zero-Day Vulnerabilities | Courtesy of infosecurity-magazine.com | 20-Nov-23 |
BPC-CR-453 | Reptar: New Intel CPU Vulnerability Impacts Multi-Tenant Virtualized Environments | Courtesy of thehackernews.com | 20-Nov-23 |
BPC-CR-452 | FIRST Announces CVSS 4.0 - New Vulnerability Scoring System | Courtesy of thehackernews.com | 20-Nov-23 |
BPC-CR-451 | Offensive and Defensive AI: Let's Chat(GPT) About It | Courtesy of thehackernews.com | 20-Nov-23 |
BPC-CR-450 | CISA Adds Three Security Flaws with Active Exploitation to KEV Catalog | Courtesy of thehackernews.com | 20-Nov-23 |
BPC-CR-449 | Microsoft upgrades security for signing keys in wake of Chinese breach | Courtesy of cyberscoop.com | 20-Nov-23 |
BPC-CR-448 | CISA roadmap seeks to protect critical infrastructure from AI | Courtesy of cyberscoop.com | 20-Nov-23 |
BPC-CR-447 | Watch out: Generative AI will level up cyber attacks, according to new Google report | Courtesy of zdnet.com | 20-Nov-23 |
BPC-CR-446 | https://cybernews.com/news/google-play-protect-scanning-malware/ | Courtesy of www.cybernews.com | 24-Oct-23 |
BPC-CR-445 | Fake Amazon and Microsoft call centers busted | Courtesy of www.cybernews.com | 24-Oct-23 |
BPC-CR-444 | Microsoft Blames Nation-State Threat Actor for Confluence Zero-Day Attacks | Courtesy of www.securityweek.com | 24-Oct-23 |
BPC-CR-443 | Apple Rolls Out Security Patches for Actively Exploited iOS Zero-Day Flaw | Courtesy of thehackernews.com | 24-Oct-23 |
BPC-CR-442 | Cisco Releases Urgent Patch to Fix Critical Flaw in Emergency Responder Systems | Courtesy of thehackernews.com | 24-Oct-23 |
BPC-CR-441 | Pro-Russian Hackers Exploiting Recent WinRAR Vulnerability in New Campaign | Courtesy of thehackernews.com | 24-Oct-23 |
BPC-CR-440 | Microsoft Releases October 2023 Patches for 103 Flaws, Including 2 Active Exploits | Courtesy of thehackernews.com | 24-Oct-23 |
BPC-CR-439 | Cisco Zero-Day Exploited to Implant Malicious Lua Backdoor on Thousands of Devices | Courtesy of thehackernews.com | 24-Oct-23 |
BPC-CR-438 | Malvertisers Using Google Ads to Target Users Searching for Popular Software | Courtesy of thehackernews.com | 24-Oct-23 |
BPC-CR-437 | D-Link Confirms Data Breach: Employee Falls Victim to Phishing Attack | Courtesy of thehackernews.com | 24-Oct-23 |
BPC-CR-436 | Apple Patches Actively Exploited iOS, macOS Zero-Days | Courtesy of securityweek.com | 20-Sep-23 |
BPC-CR-435 | Thousands of Popular Websites Leaking Secrets | Courtesy of securityweek.com | 20-Sep-23 |
BPC-CR-434 | After Microsoft and X, Hackers Launch DDoS Attack on Telegram | Courtesy of securityweek.com | 20-Sep-23 |
BPC-CR-433 | Urgent FBI Warning: Barracuda Email Gateways Vulnerable Despite Recent Patches | Courtesy of thehackernews.com | 20-Sep-23 |
BPC-CR-432 | Mozilla Rushes to Patch WebP Critical Zero-Day Exploit in Firefox and Thunderbird | Courtesy of thehackernews.com | 20-Sep-23 |
BPC-CR-431 | Microsoft Releases Patch for Two New Actively Exploited Zero-Days Flaws | Courtesy of thehackernews.com | 20-Sep-23 |
BPC-CR-430 | CNA Explains: Are Android devices more prone to malware and how do you protect yourself from scams? | Courtesy of channelnewsasia.com | 20-Sep-23 |
BPC-CR-429 | Dangerous permissions detected in top Android health apps | Courtesy of cybernews.com | 20-Sep-23 |
BPC-CR-428 | AI chatbots already surpass average human in creativity, new study finds | Courtesy of cybernews.com | 20-Sep-23 |
BPC-CR-427 | CYBER CRIME FBI Finds 1,580 Bitcoin in Crypto Wallets Linked to North Korean Hackers | Courtesy of Securityweek.com | 20-Sep-23 |
BPC-CR-426 | Akira ransomware targets Cisco VPNs to breach organizations | Courtesy of bleepingcomputer.com | 24-Aug-23 |
BPC-CR-425 | Thousands of Android Malware Apps Use Stealthy APKs to Bypass Security | Courtesy of cyware.com | 24-Aug-23 |
BPC-CR-424 | Discord reveals impact of ticket agent breach | Courtesy of cybernews.com | 24-Aug-23 |
BPC-CR-423 | Meta Set to Enable Default End-to-End Encryption on Messenger by Year End | Courtesy of thehackernews.com | 24-Aug-23 |
BPC-CR-422 | NIST releases draft overhaul of its core cybersecurity framework | Courtesy of cybersecuritydive.com | 14-Aug-23 |
BPC-CR-421 | Encryption Flaws in Popular Chinese Language App Put Users' Typed Data at Risk | Courtesy of thehackernews.com | 14-Aug-23 |
BPC-CR-420 | Balada Injector still at large – new domains discovered | Courtesy of Securityaffairs.com | 14-Aug-23 |
BPC-CR-419 | Newly Discovered Inception Attack Exposes Data from AMD Zen CPUs | Courtesy of Cyware.com | 14-Aug-23 |
BPC-CR-418 | 40 Vulnerabilities Patched in Android With August 2023 Security Updates | Courtesy of Securityweek.com | 14-Aug-23 |
BPC-CR-417 | Yashma Ransomware Evolves with Multilingual Attack | Courtesy of Cyware.com | 14-Aug-23 |
BPC-CR-416 | Fortinet: Employee security awareness is key in fight against cyberattacks | Courtesy of sdxcentral.com | 23-Jul-23 |
BPC-CR-415 | July 2023 Patch Tuesday forecast: A month of instability and uncertainty | Courtesy of helpnetsecurity | 23-Jul-23 |
BPC-CR-414 | Sophisticated BundleBot Malware Disguised as Google AI Chatbot and Utilities | Courtesy of thehackernews.com | 23-Jul-23 |
BPC-CR-413 | Azure AD Token Forging Technique in Microsoft Attack Extends Beyond Outlook, Wiz Reports | Courtesy of thehackernews.com | 23-Jul-23 |
BPC-CR-412 | Apple Threatens to Pull iMessage and FaceTime from U.K. Amid Surveillance Demands | Courtesy of thehackernews.com | 23-Jul-23 |
BPC-CR-411 | MSI data Breach: Private Code Signing Keys Leaked on the Dark Web | Courtesy of thehackernews.com | 20-Jun-23 |
BPC-CR-410 | Expert Uncover Year-Long Cyber Attack on IT Firm Utilizing Custom Malware RDStealer | Courtesy of thehackernews.com | 20-Jun-23 |
BPC-CR-409 | BlackCat threatens to leak Reddit data | Courtesy of thecyberwire.com | 20-Jun-23 |
BPC-CR-408 | Patch Tuesday Note: June 2023 | Courtesy of thecyberwire.com | 20-Jun-23 |
BPC-CR-407 | Red teaming can be groud truth for CISOs and execs | Courtesy of helpnet.security | 20-Jun-23 |
BPC-CR-406 | Hive Ransomware? Lets Learn All About It | Courtesy of cybersecurity-insiders.com | 23-May-23 |
BPC-CR-405 | Cisco fixes critical flaws in Small Business Series Switches | Courtesy of helpnetsecurity.com | 23-May-23 |
BPC-CR-404 | Malicious links and misaddressed emails slip past security control | Courtesy of helpnetsecurity.com | 23-May-23 |
BPC-CR-403 | Cyber Agencies warn of BianLian Ransomware | Courtesy of thecyberwire.com | 23-May-23 |
BPC-CR-402 | Bl00dy Ransomware Gang Strike Education Sector with Critical PaperCut Vulnerability | Courtesy of the hackernews.com | 23-May-23 |
BPC-CR-401 | Indonesia Cybercriminals Exploit AWS for Profitable Crypto Mining Operating | Courtesy of the hackernews.com | 18-Apr-23 |
BPC-CR-400 | OpenAI Reveals Redis Bug Behind ChatGPT User Data Exposure Incident | Courtesy of thehackernews.com | 18-Apr-23 |
BPC-CR-399 | Google Releases Urgent Chrome Update to Fix Actively Exploited Zero-Day Vulnerability | Courtesy of thehackernews.com | 18-Apr-23 |
BPC-CR-398 | TikTok war in US: a 21st-century game of thrones | Courtesy of Cybernews.com | 18-Apr-23 |
BPC-CR-340 | AI is booming – and helping planet Earth burn faster | Courtesy of Cybernews.com | 18-Apr-23 |
BPC-CR-399 | Google warns users of Samsung Exynos zero-day vulnerabilities | Courtesy of techtarget.com | 21-Mar-23 |
BPC-CR-398 | Chinese Hackers Targeting Security and Network Appliances | Courtesy of govinfosecurity.com | 21-Mar-23 |
BPC-CR-397 | ChatGPT grants malicious wishes? | Courtesy of thecyberwire.com | 21-Mar-23 |
BPC-CR-396 | What Is Phishing Definition? | Courtesy of cybersguards.com | 21-Mar-23 |
BPC-CR-395 | Adobe Acrobat Sign Abused to Distribute Malware | Courtesy of securityweek.com | 21-Mar-23 |
BPC-CR-394 | Stealer malware from Russia. | Courtesy of thecyberwire.com | 21-Feb-23 |
BPC-CR-393 | Phishing Attacks Are Part Of What Percentage Of Cyberattacks? | Courtesy of cybersguards.com | 21-Feb-23 |
BPC-CR-392 | Blind Eagle Hacker Group Launching Indiscriminate Attacks Using Powerful Toolset | Courtesy of gbhackers.com | 21-Feb-23 |
BPC-CR-391 | UN to Hold Hearing on Proposed Cybercrime Treaty | Courtesy of www.govinfosecurity.com | 21-Feb-23 |
BPC-CR-390 | How to improve your incident response plan for 2023 | Courtesy of helpnetsecurity.com | 21-Feb-23 |
BPC-CR-389 | Trend Micro establishes new subsidiary for 5G cybersecurity | Courtesy of www.helpnetsecurity.com | 19-Jan-23 |
BPC-CR-388 | Latest Cyberthreats and Advisories January 6, 2023 | Courtesy of www.cybersecurity-insiders.com | 19-Jan-23 |
BPC-CR-387 | Best Malware Analysis Tools List For Security Researchers & Malware Analyst 2023 | Courtesy of gbhackers.com | 19-Jan-23 |
BPC-CR-386 | Russian Turla Hackers Hijack Decade-Old Malware Infrastructure to Deploy New Backdoors | Courtesy of thehackernews.com | 19-Jan-23 |
BPC-CR-385 | UN to Hold Hearing on Proposed Cybercrime Treaty | Courtesy of www.govinfosecurity.com | 19-Jan-23 |
BPC-CR-384 | Mystery iPhone update patches against iOS 16 mail crash-attack | Courtesy of nakedsecurity.sophos.com | 15-Dec-22 |
BPC-CR-383 | Cybercriminals are having it easy with phishing-as-a-service | Courtesy of www.helpnetsecurity.com | 15-Dec-22 |
BPC-CR-382 | LinkedIn scams, fake Instagram accounts hit businesses, execs | Courtesy of www.techtarget.com | 15-Dec-22 |
BPC-CR-381 | Top Fraud Trends to Watch in 2023 | Courtesy of www.govinfosecurity.com | 15-Dec-22 |
BPC-CR-380 | AI and Residual Finger Heat Could Be a Password Cracker's Latest Tools | Courtesy of www.darkreading.com | 15-Dec-22 |
BPC-CR-379 | What is an External Penetration Test? | Courtesy of thehackernews.com | 15-Nov-22 |
BPC-CR-378 | Why Cybersecurity Should Highlight Veteran-Hiring Programs | Courtesy of darkreading.com | 15-Nov-22 |
BPC-CR-377 | How To Remove Ransomware Virus Manually? | Courtesy of cybersguards.com | 15-Nov-22 |
BPC-CR-376 | Online payment fraud is evolving | Courtesy of helpnetsecurity.com | 15-Nov-22 |
BPC-CR-375 | Unwanted emails steadily creeping into inboxes | Courtesy of helpnetsecurity.com | 15-Nov-22 |
BPC-CR-374 | Overworked CISOs may be a security risk. | Courtesy of cyberwires.com | 19-Oct-22 |
BPC-CR-373 | Protecting The Enterprise in The Digital Era | Courtesy of cyberdefensemagazine.com | 19-Oct-22 |
BPC-CR-372 | Toyota Discloses Potential Data Leak | Courtesy of binarydefense.com | 19-Oct-22 |
BPC-CR-371 | Resistant AI and ComplyAdvantage launch AI-driven solution to combat financial crime | Courtesy of helpnetsecurity.com | 19-Oct-22 |
BPC-CR-370 | ISC2CONGRESS 2022: Effective Cybersecurity Takes Collaboration | Courtesy of cybersecurity-insiders.com | 19-Oct-22 |
BPC-CR-369 | Development of secure software now an imperative for global DevOps teams | Courtesy of www.helpnetsecurity.com | 19-Sep-22 |
BPC-CR-368 | Microsoft Discover Severe One-click Exploit for TikTok Android App | Courtesy of thehackernews.com | 19-Sep-22 |
BPC-CR-367 | Twitter's data privacy battle. | Courtesy of thecyberwire.com | 19-Sep-22 |
BPC-CR-366 | Is there a growing number of public and private partnerships forming? | Courtesy of thecyberwire.com | 19-Sep-22 |
BPC-CR-365 | Securing multi-cloud identity with orchestration. | Courtesy of thecyberwire.com | 19-Sep-22 |
BPC-CR-364 | The Emergence of Dynamic Threat Hunting | Courtesy of cyberdefensemagazine.com | 23-Aug-22 |
BPC-CR-363 | Are deleted files really gone? | Courtesy of cybersecurity-insiders.com | 23-Aug-22 |
BPC-CR-362 | Apple patches double zero-day in browser and kernel update now! | Courtesy of nakedsecurity.sophos.com | 23-Aug-22 |
BPC-CR-361 | Tanium joins Microsoft Intelligent Security Association to strengthen IT security for customers | Courtesy of helpnetsecurity.com | 23-Aug-22 |
BPC-CR-360 | 35 malicious apps found on Google Play Store, installed by 2m users | Courtesy of hackread.com | 23-Aug-22 |
BPC-CR-359 | Cyber Security Threats: All You Need to Know | Courtesy of virtualattacks.com | 20-Jul-22 |
BPC-CR-358 | Your Comments On Macmillan Ransomware Attack | Courtesy of informationsecuritybuzz.com | 20-Jul-22 |
BPC-CR-357 | Different Types of Proxy Servers And How They Protect Our Online Privacy? | Courtesy of cybersguards.com | 20-Jul-22 |
BPC-CR-356 | Enterprise encryption and cybersecurity first principles, with Rick Howard. | Courtesy of cyberwires.com | 20-Jul-22 |
BPC-CR-355 | Secure Remote Work: Just An Option Or A Need For Your Business? | Courtesy of cybersquads.com | 20-Jul-22 |
BPC-CR-354 | SecurityScorecard platform enhancements empower customers to manage and reduce cyber risks | Courtesy of helpnetsecurity.com | 17-Jun-22 |
BPC-CR-353 | May ransomware attacks strike municipal governments, IT firms | Courtesy of techtarget.com | 17-Jun-22 |
BPC-CR-352 | Fake Updates Continue To Be A Digital Risk: What To Do? | Courtesy of hackread.com | 17-Jun-22 |
BPC-CR-351 | Chinese LuoYu Hackers Deploy Cyber-Espionage Malware via App Updates | Courtesy of binarydefense.com | 17-Jun-22 |
BPC-CR-350 | Microsoft Disables Iran-Linked Lebanese Hacking Group Polonium | Courtesy of darkreading.com | 17-Jun-22 |
BPC-CR-349 | US Cyber Command Team help Lithuania protect its network | Courtesy of securityweek.com | 12-May-22 |
BPC-CR-348 | Hacker exploit vulnerable Adminer for AWS database thefts | Courtesy of Shaun Nichols | 12-May-22 |
BPC-CR-347 | Ikea Canada Breach Exposes 95K customer records | Courtesy of darkreading.com | 12-May-22 |
BPC-CR-346 | Ferrari subdomain hijacked to launch fake NFT collection | Courtesy of Priyanka R (Cybersafe.news) | 12-May-22 |
BPC-CR-345 | The Ultimate Guide to Web Scraping Using Proxies | Courtesy of cybersguards.com | 12-May-22 |
BPC-CR-344 | Conti's Ransomware Toll on the Healthcare Industry | Courtesy of Krebsonsecurity.com | 21-Apr-22 |
BPC-CR-343 | Why So Many Security Experts Are Concerned About Low-Code/No-Code Apps | Courtesy of Micheal Bargury (https://www.darkreading.com/) | 21-Apr-22 |
BPC-CR-342 | Digital ID verification: Using a mobile device to prove your identity | Courtesy of helpnetsecurity.com | 21-Apr-22 |
BPC-CR-341 | Unofficial Windows 11 Upgrade Installs Info-Stealing Malware | Courtesy of Garrett Thompson (https://www.binarydefense.com/) | 21-Apr-22 |
BPC-CR-340 | Hackers Exploiting Recently Reported Windows Print Spooler Vulnerability in the Wild | Courtesy of Ravie Lakshmanan (https://www.hackernews.com/) | 21-Apr-22 |
BPC-CR-339 | CISA Warns of High-Severity Flaws in Schneider and GE Digital's SCADA Software | Courtesy of thehackernews.com | 2-Mar-22 |
BPC-CR-338 | KnowBe4 Research: Half of Employees Use Unauthorized File Services to Complete Work | Courtesy of darkreading.com | 2-Mar-22 |
BPC-CR-337 | Web Filtering and Compliances for Wi-Fi Providers | Courtesy of threatpost.com | 2-Mar-22 |
BPC-CR-336 | Instagram scammers as busy as ever: passwords and 2FA codes at risk | Courtesy of nakedsecurity.sophos.com | 2-Mar-22 |
BPC-CR-335 | Lack of visibility plaguing ICS environments | courtesy of helpnetsecurity.com | 1-Mar-22 |
BPC-CR-334 | What to do if you get an extortion email asking for Bitcoin payments | Courtesy of Steve Zurier (https://www.scmagazine.com/) | 22-Feb-22 |
BPC-CR-333 | Killware is the Next Big Cybersecurity Threat | www.cyberdefensemagazine.com | 22-Feb-22 |
BPC-CR-332 | Gaming, Banking Trojans Dominate Mobile Malware Scene | threatpost.com | 22-Feb-22 |
BPC-CR-331 | MFA market to reach $34.7 billion by 2027 | www.helpnetsecurity.com | 22-Feb-22 |
BPC-CR-330 | Log4j Remediation Took Weeks or More for Over 50% of Organizations | www.darkreading.com | 22-Feb-22 |
BPC-CR-329 | Microsoft Teams Chat acting as a malware spread point | www.cybersecurity-insiders.com | 22-Feb-22 |
BPC-CR-328 | CISA Warns of Attacks Exploiting Recent Vulnerabilities in Zabbix Monitoring Tool | www.securityweek.com | 23-Feb-22 |
BPC-CR-327 | New Report Calls For Increased Industry Collaboration To Speed IoT Security Adoption | informationsecuritybuzz.com | 23-Feb-22 |
BPC-CR-326 | CISA Expanded its Known Exploited Vulnerabilities Catalog with Two Critical Flaws | cybersguards.com | 23-Feb-22 |
BPC-CR-325 | Dridex Malware Deploying Entropy Ransomware on Hacked Computers | thehackernews.com | 23-Feb-22 |
BPC-CR-324 | Creaky Old WannaCry, GandCrab Top the Ransomware Scene | threatpost.com | 23-Feb-22 |
BPC-CR-323 | Microsoft updates security applications for multicloud environments | www.csoonline.com | 23-Feb-22 |
BPC-CR-322 | Ransomware Trained on Manufacturing Firms Led Cyberattacks in Industrial Sector | www.darkreading.com | 23-Feb-22 |
BPC-CR-321 | Why Passwordless Is at an Impasse | www.darkreading.com | 23-Feb-22 |
BPC-CR-320 | Cyber Intelligence Firm Cyble Bags $10 Million in Series A Funding | www.securityweek.com | 23-Feb-22 |
BPC-CR-319 | Chinese Researchers Detail Linux Backdoor of NSA-Linked Equation Group | www.securityweek.com | 23-Feb-22 |
BPC-CR-318 | Company offers $5m ransomware warranty for storing data on Microsoft Azure Cloud | www.cybersecurity-insiders.com | 23-Feb-22 |
BPC-CR-317 | Microsoft Debuts Unified Service for Multicloud ID Management | www.darkreading.com | 23-Feb-22 |
BPC-CR-316 | Apple AirTag anti-stalking protection bypassed by researchers | nakedsecurity.sophos.com | 23-Feb-22 |
BPC-CR-315 | Cyber aspects of the Ukraine crisis. Misusing Cobalt Strike. Logistics firm hit by effects of cyberattack. ICS security trends. | thecyberwire.com | 23-Feb-22 |
BPC-CR-314 | Tales from the Dark Web, Part 3: How Criminals Monetize Ransomware | www.darkreading.com | 23-Feb-22 |
BPC-CR-313 | CISA Warns of New Malware Framework Used by Russian 'Sandworm' Hacking Team | www.darkreading.com | 23-Feb-22 |
BPC-CR-312 | What Does Least Privilege Access Mean for Cloud Security? | www.darkreading.com | 23-Feb-22 |
BPC-CR-311 | Samsung Shattered Encryption on 100M Phones | threatpost.com | 23-Feb-22 |
BPC-CR-310 | New Data-Wiping Malware Discovered on Systems in Ukraine | www.darkreading.com | 23-Feb-22 |
BPC-CR-309 | Third-party breach hits NHS. Data exposed in children's fashion retailer's AWS S3 bucket. Third-party breach at OKCPD exposed data of sexual assault victims. | thecyberwire.com | 23-Feb-22 |
BPC-CR-308 | Automakers Need to Lock Their Doors Against Ransomware | www.darkreading.com | 23-Feb-22 |
BPC-CR-307 | Cloud Storage Leaks Grew by 150% in 2021, New CybelAngel Report Reveals | www.darkreading.com | 23-Feb-22 |
BPC-CR-306 | Cyberattack Hits Ukrainian Government, Banking Websites | www.govinfosecurity.com | 23-Feb-22 |
BPC-CR-305 | Automotive cybersecurity industry to reach $32.41 billion by 2030 | www.helpnetsecurity.com | 23-Feb-22 |
BPC-CR-304 | How costly is an insider threat? | www.helpnetsecurity.com | 31-Jan-22 |
BPC-CR-303 | Why vulnerability scanners aren’t enough to prevent a ransomware attack on your business | www.helpnetsecurity.com | 31-Jan-22 |
BPC-CR-302 | Outlook Security Feature Bypass Allowed Sending Malicious Links | www.securityweek.com | 31-Jan-22 |
BPC-CR-301 | Apple fixes Safari data leak (and patches a zero-day!) | nakedsecurity.sophos.com | 31-Jan-22 |
BPC-CR-300 | 2FA App Loaded with Banking Trojan Infests 10K Victims via Google Play | threatpost.com | 31-Jan-22 |
BPC-CR-299 | Cyberattacks on Squid Game Minecraft Tourney Take Down Andorra’s Internet | threatpost.com | 31-Jan-22 |
BPC-CR-298 | Log4j Proved Public Disclosure Still Helps Attackers | www.darkreading.com | 31-Jan-22 |
BPC-CR-297 | 5 warning signs your identity has been stolen | www.welivesecurity.com | 31-Jan-22 |
BPC-CR-296 | How to know if your email has been hacked | www.welivesecurity.com | 31-Jan-22 |
BPC-CR-295 | How I hacked my friend’s PayPal account | www.welivesecurity.com | 31-Jan-22 |
BPC-CR-294 | Mirai Based Botnet Moobot Exploit Hikvision Vulnerability | Courtesy of gbhackers.com | 11-Dec-21 |
BPC-CR-293 | When Did Cybersecurity Start? | Courtesy of cyberguards.com | 11-Dec-21 |
BPC-CR-292 | When is Cyber Security Awareness Month? | Courtesy of cyberguards.com | 11-Dec-21 |
BPC-CR-291 | FIN7 repositioning focus into ransomware. | Courtesy of thecyberwire.com | 11-Dec-21 |
BPC-CR-290 | The CISO Playbook: Storage & Backup Security Edition | Courtesy of cisomag.eccouncil.org | 10-Dec-21 |
BPC-CR-289 | What to Do While Waiting for the Log4J Updates | Courtesy of darkreading.com | 10-Dec-21 |
BPC-CR-288 | Chinese cyberespionage for the Belt and Road Initiative. NSO Group's software used to target US personnel. Microsoft seizes Chinese threat actor's domains. | Courtesy of thecyberwire.com | 10-Dec-21 |
BPC-CR-287 | December 2021: Cyber Deception Month Continues…Halting Holiday Hackers… | Courtesy of cyberdefensemagazine.com | 10-Dec-21 |
BPC-CR-286 | Extremely Critical Log4J Vulnerability Leaves Much of the Internet at Risk | Courtesy of yhehackernews.com | 10-Dec-21 |
BPC-CR-285 | Extremely Critical Log4J Vulnerability Leaves Much of the Internet at Risk | Courtesy of yhehackernews.com | 10-Dec-21 |
BPC-CR-284 | IronNet Wins 2021 Threat Detection Product of the Year at the Cyber Security Awards | Courtesy of cybersecurity-insiders.com | 10-Dec-21 |
BPC-CR-283 | AwareGO Announces the Release of Human Risk Assessment for Enterprise | Courtesy of cybersecurity-insiders.com | 10-Dec-21 |
BPC-CR-282 | Riverbed adds visibility and reporting capabilities for leading video applications | Courtesy of helpnetsecurity.com | 10-Dec-21 |
BPC-CR-281 | NIST Cyber-Resiliency Framework Extended to Include Critical Infrastructure Controls | Courtesy of darkreading.com | 10-Dec-21 |
BPC-CR-280 | Dark web posts shed light on Panasonic breach | Courtesy of techtarget.com | 10-Dec-21 |
BPC-CR-279 | Critical Apache Log4j 2 bug under attack; mitigate now | Courtesy of techtarget.com | 10-Dec-21 |
BPC-CR-278 | Week in security with Tony Anscombe | Courtesy of welivesecurity.com | 10-Dec-21 |
BPC-CR-277 | Cloudflare collaborates with leading cyber insurers to help businesses reduce their cyber risk | Courtesy of helpnetsecurity.com | 10-Dec-21 |
BPC-CR-276 | CACI partners with Yubico to enhance trusted mobile platforms | Courtesy of helpnetsecurity.com | 10-Dec-21 |
BPC-CR-275 | CloudBees raises $245M to advance and accelerate product innovation | Courtesy of helpnetsecurity.com | 10-Dec-21 |
BPC-CR-274 | Cuba ransomware gang hacked 49 US critical infrastructure organizations | Courtesy of cyberdefensemagazine.com | 10-Dec-21 |
BPC-CR-273 | Nobelium APT targets French orgs, French ANSSI agency warns | Courtesy of cyberdefensemagazine.com | 10-Dec-21 |
BPC-CR-272 | Cyberespionage in Southeast Asia. Two young extortion gangs make their bones. Bot-herders like MikroTik devices. Log4Shell zero-day exploited in the wild. Update on the Assange case. | Courtesy of thecyberwire.com | 10-Dec-21 |
BPC-CR-271 | Jason Lewkowicz joins Optiv as SVP of Cyber Defense and Applied Security | Courtesy of helpnetsecurity.com | 10-Dec-21 |
BPC-CR-270 | Security Experts Sound Alarm on Zero-Day in Widely Used Log4j Tool | Courtesy of darkreading.com | 10-Dec-21 |
BPC-CR-269 | Simplified Ransomware Mitigation | Courtesy of govinfosecurity.com | 10-Dec-21 |
BPC-CR-268 | Report Dissects Conti Ransomware Attack on Ireland's HSE | Courtesy of govinfosecurity.com | 10-Dec-21 |
BPC-CR-267 | Severe Apache Log4j Vulnerability Threatens Enterprise Apps | Courtesy of govinfosecurity.com | 10-Dec-21 |
BPC-CR-266 | Apache Log4j vulnerability actively exploited, impacting millions of Java-based apps | Courtesy of csoonline.com | 10-Dec-21 |
BPC-CR-265 | Oliver Rochford of Securonix to discuss if good security is affordable. | Courtesy of thecyberwire.com | 10-Dec-21 |
BPC-CR-264 | Weapons of distraction. Evolving US breach notification requirements. Corruption under discussion at the Summit of Democracies. | Courtesy of thecyberwire.com | 10-Dec-21 |
BPC-CR-263 | Reports: breaches at Cox Communication and DDC. Data breach in South Australia. A case of human error. | Courtesy of thecyberwire.com | 10-Dec-21 |
BPC-CR-262 | Reports: breaches at Cox Communication and DDC. Data breach in South Australia. A case of human error. | Courtesy of thecyberwire.com | 10-Dec-21 |
BPC-CR-261 | Russian National Sentenced for Role in Kelihos Botnet | Courtesy of darkreading.com | 10-Dec-21 |
BPC-CR-260 | Australian Government Staff Data Leaked in 3rd-Party Breach | Courtesy of govinfosecurity.com | 10-Dec-21 |
BPC-CR-259 | Recent quantum computing advances point to brighter future | Courtesy of searchdatacenter | 10-Dec-21 |
BPC-CR-258 | Cybersecurity employee training: How to build a solid plan | Courtesy of techtarget.com | 10-Dec-21 |
BPC-CR-257 | Next-Gen Maldocs & How to Solve the Human Vulnerability | Courtesy of threatpost.com | 10-Dec-21 |
BPC-CR-256 | High Severity Zero-Day Vulnerability CVE-2021-44228 Affects Apache Log4j | Courtesy of binarydefense.com | 10-Dec-21 |
BPC-CR-255 | Dozen of Malicious NPM Packages Caught Hijacking Discord Servers | Courtesy of gbhackers.com | 10-Dec-21 |
BPC-CR-254 | Karakurt Hacking Group Focuses on Data Theft and Extortion | Courtesy of binarydefense.com | 10-Dec-21 |
BPC-CR-253 | Oxeye Identifies Vulnerabilities Cloud Native Applications with CNAST Platform | Courtesy of gbhackers.com | 10-Dec-21 |
BPC-CR-252 | Wordfence Experts Identify Attack Targeting Over 1 Million WordPress Websites | Courtesy of binarydefense.com | 10-Dec-21 |
BPC-CR-251 | ISMG Editors: Can We Finally Get Rid of the Password? | Courtesy of govinfosecurity.com | 10-Dec-21 |
BPC-CR-250 | Hellman Worldwide Logistics: Operations Disrupted by Attack | Courtesy of govinfosecurity.com | 10-Dec-21 |
BPC-CR-249 | Critical RCE 0day in Apache Log4j library exploited in the wild (CVE-2021-44228) | Courtesy of helpnetsecurity.com | 10-Dec-21 |
BPC-CR-248 | Zero Day in Ubiquitous Apache Log4j Tool Under Active Attack | Courtesy of threatpost.com | 10-Dec-21 |
BPC-CR-247 | Cyberespionage in support of Belt and Road. Karakurt and Black Cat ransomware rising. Bot-herding. Mr. Assange's setback. | Courtesy of thecyberwire.com | 10-Dec-21 |
BPC-CR-246 | What is Relevant Work Experience for CISSP? | Courtesy of cybersecurity-insiders.com | 10-Dec-21 |
BPC-CR-245 | Identity Authentication Access Market Set to Hit $28.9B in 2021 | Courtesy of darkreading.com | 10-Dec-21 |
BPC-CR-244 | Dark Reading Reflects on a Legacy and Life Well-Written: Tim Wilson | Courtesy of darkreading.com | 10-Dec-21 |
BPC-CR-243 | Hackers Steal Research Data From Sweden's Volvo Cars | Courtesy of securityweek.com | 10-Dec-21 |
BPC-CR-242 | Exploits Swirling for Major Security Defect in Apache Log4j | Courtesy of securityweek.com | 10-Dec-21 |
BPC-CR-241 | Sprawling Active Attack Aims to Take Over 1.6M WordPress Sites | Courtesy of threatpost.com | 10-Dec-21 |
BPC-CR-240 | Google Play To Bring Android Game Titles To Windows PCs | Courtesy of techworm.net | 10-Dec-21 |
BPC-CR-239 | The business benefits of data compliance | Courtesy of techtarget.com | 10-Dec-21 |
BPC-CR-238 | Kali Linux 2021.4 released with Samba compatibility, Apple M1 support, 9 new tools | Courtesy of hackread.com | 10-Dec-21 |
BPC-CR-237 | Securing Diversity for Success | Courtesy of itsecurityguru.org | 10-Dec-21 |
BPC-CR-236 | Hackers access DNA data of over 2 million patients | Courtesy of cybersecurity-insiders.com | 10-Dec-21 |
BPC-CR-235 | The Vulnerability Lag: Cut Ransomware Risks Resulting From Digital Transformation | Courtesy of darkreading.com | 10-Dec-21 |
BPC-CR-234 | WD Updates SanDisk SecureAccess to Prevent Dictionary, Brute Force Attacks | Courtesy of securityweek.com | 10-Dec-21 |
BPC-CR-233 | BlackCat: A New Rust-based Ransomware Malware Spotted in the Wild | Courtesy of thehackernews.com | 10-Dec-21 |
BPC-CR-232 | Russia Blocks Tor Web Over Privacy Concerns | Courtesy of cisomag.eccouncil.org | 10-Dec-21 |
BPC-CR-231 | BlackCat: A New Rust-based Ransomware Malware Spotted in the Wild | Courtesy of thehackernews.com | 10-Dec-21 |
BPC-CR-230 | Should Cybersecurity be Capitalized? | Courtesy of cybersguards.com | 10-Dec-21 |
BPC-CR-229 | Do Cyber Security Jobs Drug Test? | Courtesy of cybersguards.com | 10-Dec-21 |
BPC-CR-228 | UK High Court Reverses Extradition Ruling on Julian Assange | Courtesy of govinfosecurity.com | 10-Dec-21 |
BPC-CR-227 | Fujitsu Retires Tool Targeted by Threat Actors | Courtesy of securityweek.com | 10-Dec-21 |
BPC-CR-226 | 10 countries take part in financial cyberattack war game | Courtesy of itsecurityguru.org | 10-Dec-21 |
BPC-CR-225 | Prevent Cybercriminals From Making a Run for Your Money and Personal Details | Courtesy of cisomag.eccouncil.org | 10-Dec-21 |
BPC-CR-224 | Around 300,000 MikroTik Devices Vulnerable to Hacker Intrusions | Courtesy of cisomag.eccouncil.org | 10-Dec-21 |
BPC-CR-223 | Is Cyber Security One Word? | Courtesy of cybersguards.com | 10-Dec-21 |
BPC-CR-222 | New Firefox Sandbox Isolates Third-Party Libraries | Courtesy of darkreading.com | 10-Dec-21 |
BPC-CR-221 | Afero Raises $50 Million for Its Secure IoT Platform | Courtesy of securityweek.com | 10-Dec-21 |
BPC-CR-220 | Russian Who Helped Kelihos Malware Evade Detection Sentenced to 4 Years in Prison | Courtesy of securityweek.com | 10-Dec-21 |
BPC-CR-219 | UK Court Permits Assange Extradition to US on Spying Charges | Courtesy of securityweek.com | 10-Dec-21 |
BPC-CR-218 | Vulnerabilities in Eltima SDK affect popular cloud desktop and USB sharing services | Courtesy of helpnetsecurity.com | 10-Dec-21 |
BPC-CR-217 | Landis+Gyr improves cybersecurity of smart meters with German acquisition | Courtesy of Steve Zurier (https://www.scmagazine.com/) | 26-Jun-21 |
BPC-CR-216 | From cloud to smart meters | Courtesy of Steve Zurier (https://www.scmagazine.com/) | 25-Jun-21 |
BPC-CR-215 | Four key ways to limit cyberattacks on critical energy infrastructure | Courtesy of Steve Zurier (https://www.scmagazine.com/) | 24-Jun-21 |
BPC-CR-214 | Why system backups no longer shield against ransomware | Courtesy of Steve Zurier (https://www.scmagazine.com/) | 23-Jun-21 |
BPC-CR-213 | SolarWinds hackers are back with a new mass campaign, Microsoft says | Courtesy of Steve Zurier (https://www.scmagazine.com/) | 22-Jun-21 |
BPC-CR-212 | Millions of UK WiFi Routers and Devices at Risk of FragAttacks | Courtesy of welivesecuirty.com | Amer Owaida | 25-May-21 |
BPC-CR-211 | DarkSide ransomware targets hidden files in disk partitions | Courtesy of welivesecuirty.com | Amer Owaida | 25-May-21 |
BPC-CR-210 | Google’s Password Checkup tool rolling out to Android devices | Courtesy of welivesecuirty.com | Amer Owaida | 25-Apr-21 |
BPC-CR-209 | Instagram rolls out new features to help prevent cyberbullying | Courtesy of welivesecuirty.com | Amer Owaida | 25-Apr-21 |
BPC-CR-208 | Google rushes out fix for zero‑day vulnerability in Chrome | Courtesy of welivesecuirty.com | Amer Owaida | 25-Apr-21 |
BPC-CR-207 | WhatsApp Pink: Watch out for this fake update | Courtesy of welivesecuirty.com | Amer Owaida | 25-Apr-21 |
BPC-CR-206 | FBI removes web shells from compromised Exchange servers | Courtesy of welivesecuirty.com | Amer Owaida | 25-Apr-21 |
BPC-CR-205 | WhatsApp flaw lets anyone lock you out of your account | Courtesy of welivesecuirty.com | Amer Owaida | 25-Apr-21 |
BPC-CR-204 | Does data stolen in a data breach expire? | Courtesy of welivesecuirty.com | Tony Anscombe | 25-Apr-21 |
BPC-CR-203 | Beware Android trojan posing as Clubhouse app | Courtesy of welivesecurity.com | Amer Owaida | 25-Apr-21 |
BPC-CR-202 | PayPal fraud: What merchants should know | Courtesy of welivesecurity.com | Amer Owaida | 25-Apr-21 |
BPC-CR-201 | Microsoft rushes out fixes for four zero‑day flaws in Exchange Server | Courtesy of welivesecurity.com | Amer Owaida | 25-Apr-21 |
BPC-CR-200 | Google limits which apps can access the list of installed apps on your device | Courtesy of thehackernews.com | 25-Apr-21 |
BPC-CR-199 | Passwordstate Password Manager Update Hijacked to Install Backdoor on Thousands of PCs | Courtesy of thehackernews.com | 25-Apr-21 |
BPC-CR-198 | Hackers Exploit VPN to Deploy SUPERNOVA malware on SolarWinds Orion | Courtesy of thehackernews.com | 25-Apr-21 |
BPC-CR-197 | Cybercriminals Using Telegram Messenger to Control ToxicEye Malware | Courtesy of thehackernews.com | 25-Apr-21 |
BPC-CR-196 | Hackers threaten to leak stolen Apple blueprints if $50 million ransom isn't paid | Courtesy of thehackernews.com | 25-Apr-21 |
BPC-CR-195 | Update Your Chrome Browser ASAP to Patch a Week Old Public Exploit | Courtesy of thehackernews.com | 25-Apr-21 |
BPC-CR-194 | Passwordless: More Mirage Than Reality | Courtesy of thehackernews.com | 25-Apr-21 |
BPC-CR-193 | New WhatsApp Bugs Could've Let Attackers Hack Your Phone Remotely | Courtesy of thehackernews.com | 25-Apr-21 |
BPC-CR-192 | Hackers Exploit Unpatched VPNs to Install Ransomware on Industrial Targets | Courtesy of thehackernews.com | 25-Apr-21 |
BPC-CR-191 | WhatsApp-based wormable Android malware spotted on the Google Play Store | Courtesy of thehackernews.com | 25-Apr-21 |
BPC-CR-190 | Firefox 88 patches bugs and kills off a sneaky JavaScript tracking trick | Courtesy of nakedsecurity.sophos.com | 25-Apr-21 |
BPC-CR-189 | FBI hacks into hundreds of infected US servers (and disinfects them) | Courtesy of nakedsecurity.sophos.com | 25-Apr-21 |
BPC-CR-188 | Criminals send out fake “census form†reminder – don’t fall for it! | Courtesy of nakedsecurity.sophos.com | 25-Apr-21 |
BPC-CR-187 | Apple devices get urgent patch for zero-day exploit – update now | Courtesy of nakedsecurity.sophos.com | 25-Apr-21 |
BPC-CR-186 | Instagram scams and how to avoid them | Courtesy of nakedsecurity.sophos.com | 25-Apr-21 |
BPC-CR-185 | Naked Security Live – Lessons beyond ransomware | Courtesy of nakedsecurity.sophos.com | 25-Apr-21 |
BPC-CR-184 | Naked Security Live – How to spot “government†scammers | Courtesy of nakedsecurity.sophos.com | 25-Apr-21 |
BPC-CR-183 | Microsoft Patch Tuesday, April 2021 Edition | Courtesy of Krebsonsecurity.com | 25-Apr-21 |
BPC-CR-182 | No, I Did Not Hack Your MS Exchange Server | Courtesy of Krebsonsecurity.com | 25-Apr-21 |
BPC-CR-181 | Did Someone at the Commerce Dept. Find a SolarWinds Backdoor in Aug. 2020? | Courtesy of Krebsonsecurity.com | 25-Apr-21 |
BPC-CR-180 | 67% of IT pros concerned with teleworking endpoint misuse | Courtesy of helpnetsecurity.com | 25-Apr-21 |
BPC-CR-179 | IT security teams deal with unique challenges fueled by a remote workforce | Courtesy of helpnetsecurity.com | 25-Apr-21 |
BPC-CR-178 | Hacked Android phones mimicked connected TV products for fake ad views | Courtesy of hackread.com | 25-Apr-21 |
BPC-CR-177 | Signal CEO hacks Cellebrite cellphone hacking, cracking tool | Courtesy of hackread.com | 25-Apr-21 |
BPC-CR-176 | Play Store apps plagued with malware have 700,000 downloads | Courtesy of hackread.com | 25-Apr-21 |
BPC-CR-175 | Facebook ads used in spreading Facebook Messenger phishing scam | Courtesy of hackread.com | 25-Apr-21 |
BPC-CR-174 | Combatting Email Spam – What you should know | Courtesy of hackread.com | 25-Apr-21 |
BPC-CR-173 | A hacker claims to be selling sensitive data from OTP generating firm | Courtesy of hackread.com | 25-Apr-21 |
BPC-CR-172 | Android apps on APKPure store caught spreading malware | Courtesy of hackread.com | 25-Apr-21 |
BPC-CR-171 | Fake Netflix app on Play Store caught hijacking WhatsApp sessions | Courtesy of hackread.com | 25-Apr-21 |
BPC-CR-170 | Microsoft Exchange server, Teams, Zoom, Chrome pwned at Pwn2Own | Courtesy of hackread.com | 25-Apr-21 |
BPC-CR-169 | Windows 10 Is Bringing All-New Icons In The File Explorer | Courtesy of techworm.net | 25-Apr-21 |
BPC-CR-168 | Apple Hit In A $50 Million Ransomware Hack Attack | Courtesy of techworm.net | 25-Apr-21 |
BPC-CR-167 | Microsoft Is Rolling Out News and Interests Feature to All Windows 10 Users | Courtesy of techworm.net | 25-Apr-21 |
BPC-CR-166 | New Hack Tool Can Allow Hackers To Scrape Facebook Users’ Email Addresses | Courtesy of techworm.net | 25-Apr-21 |
BPC-CR-165 | This Is Perhaps The Best Concept Design Of Windows 10 File Explorer | Courtesy of techworm.net | 25-Apr-21 |
BPC-CR-164 | Hackers Target Software Cracks And BitTorrent Client To Steal Browser Data And Cryptocurrency | Courtesy of techworm.net | 25-Apr-21 |
BPC-CR-163 | Microsoft To Update Paint And Snipping Tool Through The Microsoft Store | Courtesy of techworm.net | 25-Apr-21 |
BPC-CR-162 | Microsoft Ends Support For Cortana App On Android And iOS Devices | Courtesy of techworm.net | 25-Apr-21 |
BPC-CR-161 | PayPal Users In the U.S. Can Now Checkout With Crypto | Courtesy of techworm.net | 25-Apr-21 |
BPC-CR-160 | Payroll/HR Giant PrismHR Hit by Ransomware? | Courtesy of Krebonsecurity.com | 3-Mar-21 |
BPC-CR-159 | Microsoft: 4 Exchange Server Zero-Days Under Attack by Chinese Hacking Group | Courtesy of Securityweek.com | 3-Mar-21 |
BPC-CR-158 | Google Patches Critical Remote Code Execution Vulnerability in Android | Courtesy of Securityweek.com | 3-Mar-21 |
BPC-CR-157 | Popular password manager in the spotlight over web trackers | Courtesy of welivesecuirty.com | Amer Owaida | 3-Mar-21 |
BPC-CR-156 | Safeguarding children against cyberbullying in the age of COVID‑19 | Courtesy of welivesecuirty.com | Amer Owaida | 3-Mar-21 |
BPC-CR-155 | Google’s Password Checkup tool rolling out to Android devices | Courtesy of welivesecuirty.com | Amer Owaida | 3-Mar-21 |
BPC-CR-154 | Post-Cyberattack, Universal Health Services Faces $67M in Losses | Courtesy of threatpost.com | 3-Mar-21 |
BPC-CR-153 | Jailbreak Tool Works on iPhones Up to iOS 14.3 | Courtesy of threatpost.com | 3-Mar-21 |
BPC-CR-152 | Passwords, Private Posts Exposed in Hack of Gab Social Network | Courtesy of threatpost.com | 3-Mar-21 |
BPC-CR-151 | Firewall Vendor Patches Critical Auth Bypass Flaw | Courtesy of threatpost.com | 3-Mar-21 |
BPC-CR-150 | Malicious Mozilla Firefox Extension Allows Gmail Takeover | Courtesy of threatpost.com | 3-Mar-21 |
BPC-CR-149 | Mozilla Patches Bugs in Firefox, Now Blocks Cross-Site Cookie Tracking | Courtesy of threatpost.com | 3-Mar-21 |
BPC-CR-148 | Microsoft Lures Populate Half of Credential-Swiping Phishing Emails | Courtesy of threatpost.com | 3-Mar-21 |
BPC-CR-147 | Daycare Webcam Service Exposes 12,000 User Accounts | Courtesy of threatpost.com | 3-Mar-21 |
BPC-CR-146 | 10K Microsoft Email Users Hit in FedEx Phishing Attack | Courtesy of threatpost.com | 3-Mar-21 |
BPC-CR-145 | 15 Cybersecurity Pitfalls and Fixes for SMBs | Courtesy of threatpost.com | 3-Mar-21 |
BPC-CR-144 | Kia Motors Hit With $20M Ransomware Attack – Report | Courtesy of threatpost.com | Becky Bracken | 3-Mar-21 |
BPC-CR-143 | “ScamClub†gang outed for exploiting iPhone browser bug to spew ads | Courtesy of nakedsecurity.sophos.com | 3-Mar-21 |
BPC-CR-142 | TikTok owner ByteDance to pay $92M in US privacy Settlement | Courtesy of Securityweek.com | 3-Mar-21 |
BPC-CR-141 | Fallen victim to online fraud? Here’s what to do… | Courtesy of nakedsecurity.sophos.com | 3-Mar-21 |
BPC-CR-140 | Is your company spending enough on their cyber security budget? | Courtesy of Information-age.com (Nick Ismail) | 3-Mar-21 |
BPC-CR-139 | Unpatched ShareIT Android App Flaw Could Let Hackers Inject Malware | Courtesy of thehackernews.com | 3-Mar-21 |
BPC-CR-138 | SolarWinds Hackers Stole Some Source Code for Microsoft Azure, Exchange, Intune | Courtesy of thehackernews.com | 3-Mar-21 |
BPC-CR-137 | New Hack Lets Attackers Bypass MasterCard PIN by Using Them As Visa Card | Courtesy of thehackernews.com | 3-Mar-21 |
BPC-CR-136 | Everything You Need to Know About Evolving Threat of Ransomware | Courtesy of thehackernews.com | 3-Mar-21 |
BPC-CR-135 | Chinese Hackers Using Firefox Extension to Spy On Tibetan Organizations | Courtesy of thehackernews.com | 3-Mar-21 |
BPC-CR-134 | Cisco Releases Security Patches for Critical Flaws Affecting its Products | Courtesy of thehackernews.com | 3-Mar-21 |
BPC-CR-133 | SolarWinds Blames Intern for 'solarwinds123' Password Lapse | Courtesy of thehackernews.com | 3-Mar-21 |
BPC-CR-132 | Why do companies fail to stop breaches despite soaring IT security investment? | Courtesy of thehackernews.com | 3-Mar-21 |
BPC-CR-131 | Microsoft failed to fix known problems that could have prevented SolarWinds hack | Courtesy of thehackernews.com | 3-Mar-21 |
BPC-CR-130 | European e-ticketing platform Ticketcounter confirms data breach | Courtesy of Cybersafe.com (Priyanka R) | 3-Mar-21 |
BPC-CR-129 | Australia passes law forcing Google and Facebook to pay for news content | Courtesy of Cybersafe.com (Priyanka R) | 3-Mar-21 |
BPC-CR-128 | Finland’s IT giant TietoEVRY discloses ransomware attack | Courtesy of Cybersafe.com (Priyanka R) | 3-Mar-21 |
BPC-CR-127 | Chinese hackers targeted India’s Power Grid | Courtesy of Cybersafe.com (Priyanka R) | 3-Mar-21 |
BPC-CR-126 | Making IoT devices safe from hackers | Courtesy sifted.eu | Kit Gillet | 11-Feb-21 |
BPC-CR-125 | Secure Messaging Protocols Part 1: A Brief History | Courtesy of wickr.com | 11-Feb-21 |
BPC-CR-124 | A Swiss Company Says It Found Weakness That Imperils Encryption | Courtesy of bloomberg.com | Ryan Gallagher | 11-Feb-21 |
BPC-CR-123 | 5 cybersecurity lessons from the SolarWinds breach | Courtesy of TechTarget.com | Sandra Gittlen | 10-Feb-21 |
BPC-CR-122 | Employee PC hacked via TeamViewer in attempted water supply poisoning | Courtesy of hackread.com | Waqas | 10-Feb-21 |
BPC-CR-121 | Update service for Android gaming emulator abused to drop malware | Courtesy of hackread.com | Saad Rajpoot | 10-Feb-21 |
BPC-CR-120 | Empowering a remote workforce is a top priority for CEOs | Courtesy of thehackernews.com | 10-Feb-21 |
BPC-CR-119 | Organizations can no longer afford a reactive approach to risk management | Courtesy of thehackernews.com | 10-Feb-21 |
BPC-CR-118 | Three ways MITRE ATT&CK can improve your organizational security | Courtesy of thehackernews.com | 10-Feb-21 |
BPC-CR-117 | Most zoombombing incidents are inside jobs | Courtesy of helpnetsecurity.com | 10-Feb-21 |
BPC-CR-116 | Your security technology is only as strong as your team | Courtesy of helpnetsecurity.com | Adi Dar CEO of Cyberbit | 10-Feb-21 |
BPC-CR-115 | Can we put a stop to cyber harassment? | Courtesy of helpnetsecurity.com | Zeljka Zorz | 10-Feb-21 |
BPC-CR-114 | Hackers hit CD Projekt Red, steal data, ask for ransom | Courtesy of helpnetsecurity.com | Zeljka Zorz | 10-Feb-21 |
BPC-CR-113 | February 2021 Patch Tuesday: Microsoft and Adobe fix exploited zero-days | Courtesy of helpnetsecurity.com | Zeljka Zorz | 10-Feb-21 |
BPC-CR-112 | WARNING — Hugely Popular 'The Great Suspender' Chrome Extension Contains Malware | Courtesy of thehackernews.com | 10-Feb-21 |
BPC-CR-111 | Cybercriminals Now Using Plex Media Servers to Amplify DDoS Attacks | Courtesy of thehackernews.com | 10-Feb-21 |
BPC-CR-110 | Critical Flaws Reported in Cisco VPN Routers for Businesses—Patch ASAP | Courtesy of thehackernews.com | 10-Feb-21 |
BPC-CR-109 | New Chrome Browser 0-day Under Active Attack—Update Immediately! | Courtesy of thehackernews.com | 10-Feb-21 |
BPC-CR-108 | How to Audit Password Changes in Active Directory | Courtesy of thehackernews.com | 10-Feb-21 |
BPC-CR-107 | Why Human Error is #1 Cyber Security Threat to Businesses in 2021 | Courtesy of thehackernews.com | 10-Feb-21 |
BPC-CR-106 | Hackers Exploiting Critical Zero-Day Bug in SonicWall SMA 100 Devices | Courtesy of thehackernews.com | 10-Feb-21 |
BPC-CR-105 | Facebook etiquette: Behaviors you should avoid | Courtesy of welivesecuirty.com | Amer Owaida | 10-Feb-21 |
BPC-CR-104 | Identity theft spikes amid pandemic | Courtesy of welivesecuirty.com | Amer Owaida | 10-Feb-21 |
BPC-CR-103 | CES 2021: Car spying – your insurance company is watching you | Cortesy of welivesecurity.com | Cameron Camp | 10-Feb-21 |
BPC-CR-102 | 5 common scams and how to avoid them | Courtesy of welivesecuirty.com | Amer Owaida | 10-Feb-21 |
BPC-CR-101 | PayPal users targeted in new SMS phishing campaign | Courtesy of welivesecuirty.com | Amer Owaida | 10-Feb-21 |
BPC-CR-100 | 7 ways malware can get into your device | Courtesy of welivesecuirty.com | Amer Owaida | 10-Feb-21 |
BPC-CR-099 | How scammers target PayPal users and how you can stay safe | Courtesy of welivesecuirty.com | Amer Owaida | 10-Feb-21 |
BPC-CR-098 | SolarWinds Attack Underscores 'New Dimension' in Cyber-Espionage Tactics | Courtesy of darkreading.com | Kelly Jackson Higgings | 10-Feb-21 |
BPC-CR-097 | Startup Offers Free Version of its 'Passwordless' Technology | Courtesy of darkreading.com | Kelly Jackson Higgings | 10-Feb-21 |
BPC-CR-096 | Microsoft Office 365 Attacks Sparked from Google Firebase | Courtesy of threatpost.com | Tara Seals | 10-Feb-21 |
BPC-CR-095 | Spotify Suffers Second Credential-Stuffing Cyberattack in 3 Months | Courtesy of threatpost.com | Tara Seals | 10-Feb-21 |
BPC-CR-094 | Android Devices Prone to Botnet’s DDoS Onslaught | Courtesy of threatpost.com | Lindsey O'Donnell | 10-Feb-21 |
BPC-CR-093 | Ransomware Attacks Hit Major Utilities | Courtesy of threatpost.com | Tara Seals | 10-Feb-21 |
BPC-CR-092 | Unpatched WordPress Plugin Code-Injection Bug Afflicts 50K Sites | Courtesy of threatpost.com | Tara Seals | 10-Feb-21 |
BPC-CR-091 | Fake Forcepoint Google Chrome Extension Hacks Windows Users | Courtesy of threatpost.com | Tara Seals | 10-Feb-21 |
BPC-CR-090 | Critical WordPress Plugin Flaw Allows Site Takeover | Courtesy of threatpost.com | Lindsey O'Donnell | 10-Feb-21 |
BPC-CR-089 | Billions of Passwords Offered for $2 in Cyber-Underground | Courtesy of threatpost.com | Tara Seals | 10-Feb-21 |
BPC-CR-088 | Google Play Boots Barcode Scanner App After Ad Explosion | Courtesy of threatpost.com | Becky Bracken | 10-Feb-21 |
BPC-CR-087 | Actively Exploited Windows Kernel EoP Bug Allows Takeover | Courtesy of threatpost.com | Tara Seals | 10-Feb-21 |
BPC-CR-086 | Google Titan security keys hacked by French researchers | Courtesy of nakedsecurity.sophos.com | 10-Feb-21 |
BPC-CR-085 | Beware of technical “experts†bombarding you with bug reports | Courtesy of nakedsecurity.sophos.com | 10-Feb-21 |
BPC-CR-084 | Facebook, Instagram, TikTok and Twitter Target Resellers of Hacked Accounts | Courtesy of Krebsonsecurity.com | 10-Feb-21 |
BPC-CR-083 | Adobe Patches Reader Vulnerability Exploited in the Wild | Courtesy of Securityweek.com | Eduard Kovacs | 4-Feb-21 |
BPC-CR-082 | BEC Scammers Take Advantage of "Out-of-Office" Microsoft 365 Users | Courtesy of Graham Cluley bitdefender.com | 4-Feb-21 |
BPC-CR-081 | Hackers could live-stream your home through your LifeShield security camera | Courtesy of Graham Cluley bitdefender.com | 4-Feb-21 |
BPC-CR-080 | NCSC Warns of China’s Efforts to Collect US DNA Data | Courtesy of Marianne kolbasuk McGee | 4-Feb-21 |
BPC-CR-079 | China Tied to Separate SolarWinds Espionage Campaign | courtesy of Mathew J Schwartz (govinfosecurity.com) | 4-Feb-21 |
BPC-CR-078 | Ransomware Newcomers Include Pay2Key, RansomEXX, Everest | courtesy of Mathew J Schwartz (govinfosecurity.com) | 4-Feb-21 |
BPC-CR-077 | Emotet: Police raids take down botnet that hacked 'millions of computers worldwide' | Courtesy of news sky | 4-Feb-21 |
BPC-CR-076 | When cryptographers looked at iOS and Android security, they weren’t happy | Courtesy of Evan Schuman the zen mof mobile | 4-Feb-21 |
BPC-CR-075 | Agent Tesla Trojan ‘Kneecaps’ Microsoft’s Anti-Malware Interface | Courtesy of Lindsey O'Donnell | 4-Feb-21 |
BPC-CR-074 | Does Your Contact Tracing App Track Your Location? | Courtesy of binaryblogger.com | 4-Feb-21 |
BPC-CR-073 | Mozilla will roll out its VPN service in Germany and France in Q1 2021 | Courtesy of Virtualattacks.com | 4-Feb-21 |
BPC-CR-072 | Kobalos malware is targeting supercomputers worldwide | Courtesy of Virtualattacks.com | 4-Feb-21 |
BPC-CR-071 | Ransom payments are declining as many victims decide not to pay | Courtesy of Virtualattacks.com | 4-Feb-21 |
BPC-CR-070 | Google Chrome blocks eight ports against new NAT Slipstreaming attack | Courtesy of Virtualattacks.com | 4-Feb-21 |
BPC-CR-069 | Hacker leaks data of MeetMindful dating site | Courtesy of Virtualattacks.com | 4-Feb-21 |
BPC-CR-068 | SonicWall firewall maker hacked Via Zero-Day Flaw in its products | Courtesy of Virtualattacks.com | 4-Feb-21 |
BPC-CR-067 | DNSpooq allows attackers to poison DNS cache records | Courtesy of Virtualattacks.com | 4-Feb-21 |
BPC-CR-066 | The fourth type of malware discovered in the SolarWind Hack | Courtesy of Virtualattacks.com | 4-Feb-21 |
BPC-CR-065 | Instagram Bug : Passwords are in Plain Text | Courtesy of Hackerritz.blogspot.com | 4-Feb-21 |
BPC-CR-064 | Hackers Reveal How Code Injection Attack Works in Signal Messaging App | Courtesy of Hackerritz.blogspot.com | 4-Feb-21 |
BPC-CR-063 | Hackers Can Steal All Your Passwords Through The Pre-Installed Password Manager On Windows 10 | Courtesy of Hackerritz.blogspot.com | 4-Feb-21 |
BPC-CR-062 | A new software supply-chain attack targeted users with spyware | Courtesy of Cybersafe.com | 4-Feb-21 |
BPC-CR-061 | New Year, New Ransomware: Babuk Locker Targets Large Corporations | Courtesy of Lindsey O'Donnell | 26-Jan-21 |
BPC-CR-060 | Hackers are using DDoS attacks to squeeze victims for ransom | Courtesy of Anthony Spadafora (techradar.com) | 26-Jan-21 |
BPC-CR-059 | Emotet Tops Malware Charts in December After Reboot | Courtesy of Phil Muncaster (infosecuirty-magazine.com | 26-Jan-21 |
BPC-CR-058 | Malicious Software Infrastructure Easier to Get and Deploy Than Ever | Courtesy of Becky Bracken threatpost.com | 26-Jan-21 |
BPC-CR-057 | Ransomware Gangs Scavenge for Sensitive Data by Targeting Top Executives | Courtesy of Graham Cluley tripwire.com | 26-Jan-21 |
BPC-CR-056 | Free decrypter released for victims of Darkside ransomware | Courtesy of Catalin Cimpanu for Zero day Zdnet.com | 26-Jan-21 |
BPC-CR-055 | Third malware strain discovered in SolarWinds supply chain attack | Courtesy of Catalin Cimpanu for Zero day Zdnet.com | 26-Jan-21 |
BPC-CR-054 | Sunspot malware scoured servers for SolarWinds builds that it could weaponize | Coutrtesy of Bradley Barth scmagazine.com | 26-Jan-21 |
BPC-CR-053 | AI set to replace humans in cybersecurity by 2030, says Trend Micro survey | Courtesy of Eileen Brown for Social Business (zdnet.com) | 26-Jan-21 |
BPC-CR-052 | Sophisticated Hacks Against Android, Windows Reveal Zero-Day Trove | Courtesy of Elizabeth Montalbano | 26-Jan-21 |
BPC-CR-051 | How to Detect Supply Chain Attacks | Courtesy of Threat research (blog.reversinglabs.com) | 26-Jan-21 |
BPC-CR-050 | Hackers leverage sophisticated and novel techniques to break into networks | Courtesy of Jurgita Lapienyte cybernews.com | 26-Jan-21 |
BPC-CR-049 | What is supply chain security? | Courtesy of Magda Ramos (ibm.com) | 26-Jan-21 |
BPC-CR-048 | SolarWinds Malware Arsenal Widens with Raindrop | Courtesy of Tara Seals (threatpost.com) | 26-Jan-21 |
BPC-CR-047 | Raindrop: New Malware Discovered in SolarWinds Investigation | Courtesy of threat Hunter Team Symantec | 26-Jan-21 |
BPC-CR-046 | FireEye releases tool for auditing networks for techniques used by SolarWinds hackers | Courtesy of Catalin Cimpanu for Zero day Zdnet.com | 26-Jan-21 |
BPC-CR-045 | How to secure your Google account and keep it safe from attacks | Courtesy of Zdnet.com | 8-Jan-21 |
BPC-CR-044 | Are utilities keeping up with cyber threats? | Courtesy of www.smart-energy.com | 8-Jan-21 |
BPC-CR-043 | Government raises alert level on email virus ‘Emotet’ | Courtesy of Jessica Yun / Yahoo Finance AU | 8-Jan-21 |
BPC-CR-042 | How to check if you've been hacked | Courtesy of David Nield (articles from MSN News) | 8-Jan-21 |
BPC-CR-041 | Windows 7 End of Life | Author Haji Aman of Berakas Power Company | 8-Jan-21 |
BPC-CR-040 | Zero-day vulnerability: What it is, and how it works | Courtesy of NortonLifeLock Employee of Symantec corporation | 12-Nov-20 |
BPC-CR-039 | Hacker leaks passwords for more than 500,000 servers, routers, and IoT devices | Courtesy of Catalin Cimpanu of ZDNet (Security Reporter) | 12-Nov-20 |
BPC-CR-038 | Hackers taking advantage of coronavirus scare to spread malware | Courtesy of Aaron Mammit of Digital Trends | 12-Nov-20 |
BPC-CR-037 | Phishing Scams: Why Employees Click and What to Do About It IndustryView | Courtesy of softwareadvice.com | 12-Nov-20 |
BPC-CR-036 | IT Security adn Privacy | Courtesy of https://www.zdnet.com/ | 12-Nov-20 |
BPC-CR-035 | Are utilities keeping up with cyber threats? | Courtesy of www.sciencedirect.com | 12-Nov-20 |
BPC-CR-034 | Cyber Security Tips and Advice for Remote Workers | Courtesy of terranovasecurity.com | 12-Nov-20 |
BPC-CR-033 | Basic Security Training for End User | Courtest of www.slideshare.net | 12-Nov-20 |
BPC-CR-032 | 7 Security Tips video for employees | Courtest of lucysecurity.com | 12-Nov-20 |
BPC-CR-031 | Cybersecurity in an IoT and mobile world: The key trends | Courtesy of Charles McLellan(ZDNet.com) | 12-Nov-20 |
BPC-CR-030 | Fake news on Covid-19 government initatives boost phishing in Brazil | Courtesy of Angelica Mari (ZDNet.com) | 7-Oct-20 |
BPC-CR-029 | WannaRen ransomware author contacts security firm to share decryption key | Courtesy of Catalin Cimpanu (ZDNet.com) | 7-Oct-20 |
BPC-CR-028 | Ransomware: These warning signs could mean you are already under attack | Courtesy of Steve Ranger (ZDNet.com) | 7-Oct-20 |
BPC-CR-027 | Penetration Testing: The Importance of Knowing Your Own Vulnerabilities | Courtesy of www.cybersecurity-insiders.com | 7-Oct-20 |
BPC-CR-026 | Attack of the Instagram clones | Courtesy of Jake Moore (welivesecurity.com) | 7-Oct-20 |
BPC-CR-025 | Business Email Compromise – fighting back with machine learning | Courtesy of Paul Ducklin (nakedsecurity.sophos.com) | 7-Oct-20 |
BPC-CR-024 | Beware: New Android Spyware Found Posing as Telegram and Threema Apps | Courtesy Ravie Lakshmanan (thehackernews) | 7-Oct-20 |
BPC-CR-023 | New Flaws in Top Antivirus Software Could Make Computers More Vulnerable | Courtesy Ravie Lakshmanan (thehackernews) | 7-Oct-20 |
BPC-CR-022 | US gov’t warns against paying off ransomware attackers | Courtesy of Amer Owaida (welivesecurity.com) | 7-Oct-20 |
BPC-CR-021 | Had your face stolen lately? | Courtesy of Cameron Camp (welivesecurity.com) | 7-Oct-20 |
BPC-CR-020 | 5 steps to secure your connected devices | Courtesy of Amer Owaida (welivesecurity.com) | 21-Aug-20 |
BPC-CR-019 | Startup Aims to Map and Track All the IT and Security Things | Courtesy of Kelly Jackson Higgins(darkreading.com) | 21-Aug-20 |
BPC-CR-018 | New Windows Print Spooler Zero-Day Flaws Harken Back to Stuxnet | Courtesy of Kelly Jackson Higgins(darkreading.com) | 21-Aug-20 |
BPC-CR-017 | Siemens Teams Up in OT Endpoint Security | Courtesy of Kelly Jackson Higgins(darkreading.com) | 21-Aug-20 |
BPC-CR-016 | Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic | Courtesy of Kelly Jackson Higgins(darkreading.com) | 21-Aug-20 |
BPC-CR-015 | If you connect it, protect it | Courtesy of Paul Ducklin (nakedsecurity.sophos.com) | 21-Aug-20 |
BPC-CR-014 | Layered security becomes critical as malware attacks rise | Courtesy of Helpnet Security.com | 21-Aug-20 |
BPC-CR-013 | Over 2800 e-Shops Running Outdated Magento Software Hit by Credit Card Hackers | Courtesy of Ravi Lakshmanan | 21-Aug-20 |
BPC-CR-012 | Google Chrome Zero-Days Under Active Exploitation | Courtesy of threatpost.com | 21-Aug-20 |
BPC-CR-011 | Watch Out! New Android Banking Trojan Steals From 112 Financial Apps | Courtesy of Ravi Lakshmanan | 21-Aug-20 |
BPC-CR-010 | Microsoft Teams Users Under Attack in ‘FakeUpdates’ Malware Campaign | Courtesy of Elizabeth Montalbano | 21-Aug-20 |
BPC-CR-009 | Nvidia Warns Windows Gamers of GeForce NOW Flaw | Courtesy of Lindsey O'Donnell | 21-Aug-20 |
BPC-CR-008 | Microsoft Patch Tuesday Update Fixes 17 Critical Bugs | Courtesy of Tom Spring | 21-Aug-20 |
BPC-CR-007 | Microsoft Exchange Attack Exposes New xHunt Backdoors | Courtesy of Threatpost.com | 4-Feb-20 |
BPC-CR-006 | Update Your iOS Devices Now — 3 Actively Exploited 0-Days Discovered | Courtesy of Ravi Lakshmanan | 27-Jan-20 |
BPC-CR-005 | Ragnar Locker Ransomware Gang Takes Out Facebook Ads in Key New Tactic | Courtesy of Becky Bracken | 27-Jan-20 |
BPC-CR-004 | SolarWinds | Understanding & Detecting the SUPERNOVA Webshell Trojan | Courtesy of MARCO FIGUEROA | 16-Jan-20 |
BPC-CR-003 | The Emotet botnet is back and hits 100K recipients per day | Courtesy of Pierluigi Paganini | 6-Dec-19 |
BPC-CR-002 | What’s Next for Ransomware in 2021? | Courtesy of Becky Bracken (https://threatpost.com/) | 6-Dec-19 |