Most Recent Articles
Know your rights. Right to restrict processing. How to limit the handling of data.
When you need more time to decide whether your data should be deleted from an
organization’s system, you can restrict processing. This right is important
because it gives you time and assurance that your data won’t be utilized while
concerns or errors …
Phishing Reporter Publication in April 2024 (coming soon)
Improvements
The Phishing Reporter now supports the web view Trident that is provided by the Internet Explorer.
Der Beitrag Phishing Reporter Publication in April 2024 (coming soon) erschien zuerst auf Hornetsecurity.
How do Venmo scams work, and how to avoid them
Venmo has become one of the most popular peer-to-peer payment apps, making it
easy to split the cost of a meal, pay a friend back for concert tickets, or gift
money. However, the convenience of Venmo has also made it a target for scammers
looking to ta…
Threat actor leaks info of 2.8 million Giant Tiger shoppers online
A threat actor operating on the underground forum called BreachForums has
recently leaked the personal information of 2.8 million Giant Tiger shoppers.
According to a public listing posted on April 12, the hacker stole 2.8 million
unique email address…
IT Pro Tuesday #297
Der Beitrag IT Pro Tuesday #297 erschien zuerst auf Hornetsecurity.
Half a Million Roku Accounts Compromised in Credential Stuffing Attack
Following an investigation into unusual activity regarding login attempts using
personal information from third-party data breaches, Roku said it has found over
half a million additional accounts impacted by this problem.
In March 2023, Roku said hack…
Security Engineer Who Stole $12 Million in Crypto Hacks Gets 3 Years in Prison
A security engineer who specialized in reverse engineering smart contracts and
blockchain audits will spend three years behind bars for hacking two
decentralized cryptocurrency exchanges and stealing $12 million in digital coin.
In 2022, New York City…
US, Australian Authorities Arrest Alleged Firebird RAT Creators
In a collaborative effort, the Australian Federal Police (AFP) and the FBI
arrested two suspects allegedly involved in creating and spreading the
“Firebird” Remote Access Trojan (RAT).
The malicious tool, renamed “Hive,” was not among the most notorio…