Daily Crunch: Cell network provider Google Fi confirms customer data breach

Google Fi, the cell network provider owned by Google, has recently confirmed a customer data breach, leading to stolen personal information. This incident has sparked concerns over the safety of user data, especially since the company was believed to be one of the most secure networks on the market. Google Fi notified their customers of… Continue reading Daily Crunch: Cell network provider Google Fi confirms customer data breach

RSA’s demise from quantum attacks is very much exaggerated, expert says

The security measures employed by most digital systems and services rely on strong cryptography as their foundation. In particular, RSA (Rivest–Shamir–Adleman) security has become a standard measure of protection against nefarious actors in the cyber world. However, fears of a ‘quantum attack’ have been growing in recent years, prompting concern among many security experts that… Continue reading RSA’s demise from quantum attacks is very much exaggerated, expert says

iOS 16.3 Lets You Use a Physical Key for Added Security When Logging Into Your Apple Account

The latest version of iOS, iOS 16.3, is giving users the ability to add an extra layer of security to their Apple accounts. With this latest update, users can now use a physical security key when logging in to their Apple accounts. Physical security keys, or hardware-based two-factor authentication (2FA), are devices that users insert… Continue reading iOS 16.3 Lets You Use a Physical Key for Added Security When Logging Into Your Apple Account

Hundreds of SugarCRM servers infected with critical in-the-wild exploit

On July 7th, hundreds of SugarCRM servers were discovered to be infected with a critical in-the-wild exploit. The exploit, which appears to have been developed from an existing vulnerability known to affect all versions of SugarCRM, allows malicious actors to remotely execute code on the vulnerable servers. This security issue has exposed SugarCRM customers to… Continue reading Hundreds of SugarCRM servers infected with critical in-the-wild exploit

More than 4,400 Sophos firewall servers remain vulnerable to critical exploits

Hundreds of Sophos Firewall servers remain vulnerable to two publicly identified critical security vulnerabilities, lasting over 10 months since they were first discovered. The two vulnerabilities, Taipan and Whitewizard, were first publicly identified in December 2019, but despite being patched, thousands of Sophos Firewall devices remain vulnerable and open to attack. Taipan is a remote… Continue reading More than 4,400 Sophos firewall servers remain vulnerable to critical exploits

Twitter’s data leak response is a lesson in how not to do cybersecurity

Twitter recently announced that it had inadvertently “unintentionally” leaked sensitive data, specifically the phone numbers and usernames of some of its most influential users, in an incident that could have far-reaching consequences. The incident, which was first noticed by the cybersecurity firm HaveIBeenPwned, prompted an investigation from Twitter and a promise to “take steps to… Continue reading Twitter’s data leak response is a lesson in how not to do cybersecurity

Fortinet says hackers exploited critical vulnerability to infect VPN customers

It appears that a critical vulnerability in Fortinet’s virtual private network (VPN) service was recently exploited by hackers, allowing them to gain access to customers’ systems. This security flaw, which was uncovered by cybersecurity firm Check Point, can allow malicious actors to execute arbitrary code on Fortinet devices, creating a dangerous and successful backdoor for… Continue reading Fortinet says hackers exploited critical vulnerability to infect VPN customers

Vulnerability with 9.8 severity in Control Web Panel is under active exploit

Security experts recently alerted organizations of a serious vulnerability with a 9.8 severity rating associated with control web panels. According to reports, the vulnerability, tracked as CVE-2020-0001, has been actively exploited in the wild. The vulnerability discloses a remote code execution (RCE) weakness in an affected control web panel application. Hackers have been exploiting it… Continue reading Vulnerability with 9.8 severity in Control Web Panel is under active exploit

Messenger billed as better than Signal is riddled with vulnerabilities

In recent days, a new messaging app called ‘Krypton’ has been gaining attention as a potential alternative to the renowned Signal messaging app. Despite claims of advanced encryption and privacy features on their website, an independent research has revealed that the app is a security nightmare, riddled with vulnerabilities. Krypton’s promise of tight security and… Continue reading Messenger billed as better than Signal is riddled with vulnerabilities

Anker’s Eufy breaks its silence on security cam security

In light of recent security camera hacking incidents, Anker’s Eufy has issued a statement on the security of their products. In recent months, numerous major security camera brands have fallen victim to security breaches. These incidents have sparked a wave of concern over the safety of connected home systems and associated devices. Following the incidents,… Continue reading Anker’s Eufy breaks its silence on security cam security

Exit mobile version