Threats and Breaches

Stay current with latest developments in the hacking world. Explore topics, ranging from threats and breaches including data breaches to password hacks to malware. Readers can find posts updated hourly covering incidents around the world authored by some of leading experts and contributors in Cybersecurity industry.

Get a demo

Roku experiences another data breach; Apple notifies users about mercenary spyware attacks

It’s rare to see a data breach study observers call a “mixed bag.” Normally, reports on data breaches are grim, touting how each year was a record high for the number of ...

Potential Risk Indicator Decay and Insider Risk Management

Who among us hasn’t received an answer to what we thought was a precise question with, “it depends” and our mind remains befuddled. Potential Risk Indicators are like that: on the surface ...
Devs flood npm with 15,000 packages to reward themselves with Tea 'tokens'

Devs flood npm with 15,000 packages to reward themselves with Tea ‘tokens’

We have repeatedly come across cases involving open source registries like npm and PyPI being flooded with thousands of packages in a short span of time. Typically, such surges in publishing activity ...

CSBR Slams Microsoft Over Storm-0558 Attacks | Key Insight

In recent news, the U.S. Cyber Safety Review Board (CSBR) has raised concerns over Microsoft’s handling of the Storm-0558 attacks, highlighting significant security lapses that allowed a China-based nation-state group to breach ...
Critical RCE Vulnerability in 92,000 D-Link NAS Devices

Critical RCE Vulnerability in 92,000 D-Link NAS Devices

Cyber attacks have become increasingly prevalent. This has caused significant adverse impacts on businesses of all sizes. According to the latest Ponemon Institute’s State of Cybersecurity Report, 66% of respondents reported experiencing ...
credential stuffing password

Roku: Credential Stuffing Attacks Affect 591,000 Accounts

Almost 600,000 Roku customers had their accounts hacked through two credential stuffing attacks several weeks apart, illustrating the ongoing risks to people who reuse passwords for multiple online accounts. The streaming service ...
Security Boulevard

A Step-by-Step Video Guide to Using Fortra VM

The post A Step-by-Step Video Guide to Using Fortra VM appeared first on Digital Defense ...

LayerSlider Plugin Flaw Exposes 1M Sites To SQL Injections

Recent media reports have revealed a crucial LayerSlider plugin flaw. According to these reports, this flaw has exposed numerous WordPress sites to SQL attacks and infections. If exploited, the flaw allows users ...