Wipro Confirms Hack and Supply Chain Attacks on Customers
The IT giant’s networks were infiltrated and used to mount supply-chain attacks on its enterprise customers. Go to Source
The IT giant’s networks were infiltrated and used to mount supply-chain attacks on its enterprise customers. Go to Source
Patched just last week, the Windows kernel bug is being used for full system takeover. Go to Source
After the HawkEye malware kit underwent an ownership change and new development, researchers are spotting the keylogger used in several malicious email campaigns. Go to Source
A popular Australian smartwatch’s tracking capabilities expose its user’s locations, personal data and more. Go to Source
The apps, which claim to help users rack up followers, are well-rated and have been downloaded tens of thousands of times. Go to Source
Business users of Cisco, F5 Networks, Palo Alto Networks and Pulse Secure platforms are impacted, according the U.S. government. Go to Source
A Microsoft Outlook breach that was disclosed on Friday is thought to be much larger than previously said, a new report found. Go to Source
Why many attack techniques can be reused – but organizations can’t defend against them. Go to Source
A vulnerability in the Yuzo Related Posts WordPress plugin, used by 60,000 websites, is being exploited in the wild. Go to Source
The duo are convicted of infecting 400,000 computers in the U.S. with malware and scamming victims out of millions of dollars. Go to Source