by Liquid Video Technologies | Mar 3, 2021 | Cybersecurity, Data Breaches, Network Security, Security, Security Breach
Called CNAME Cloaking, the practice of blurring the distinction between first-party and third-party cookies not only results in leaking sensitive private information without users’ knowledge and consent but also “increases [the] web security threat...
by Liquid Video Technologies | Mar 1, 2021 | Cybersecurity, Data Breaches, Security, Security Breach
Called “Shadow attacks” by academics from Ruhr-University Bochum, the technique uses the “enormous flexibility provided by the PDF specification so that shadow documents remain standard-compliant.” The findings were presented yesterday at the...
by Liquid Video Technologies | Feb 26, 2021 | Cybersecurity, Data Breaches, Security Breach
Cybersecurity researchers have disclosed a novel attack that could allow criminals to trick a point of sale terminal into transacting with a victim’s Mastercard contactless card while believing it to be a Visa card. The research, published by a group of...
by Liquid Video Technologies | Feb 24, 2021 | Cybersecurity, Data Breaches, Technology News
Microsoft on Thursday said it concluded its probe into the SolarWinds hack, finding that the attackers stole some source code but confirmed there’s no evidence that they abused its internal systems to target other companies or gained access to production...
by Liquid Video Technologies | Feb 22, 2021 | Cybersecurity, Data Breaches
Russia-linked state-sponsored threat actor known as Sandworm has been linked to a three-year-long stealthy operation to hack targets by exploiting an IT monitoring tool called Centreon. The intrusion campaign — which breached “several French entities” — is...
by Liquid Video Technologies | Feb 15, 2021 | Cybersecurity, Data Breaches, News, Security, Security Breach
New details have emerged about the remote computer intrusion at a Florida water treatment facility last Friday, highlighting a lack of adequate security measures needed to bulletproof critical infrastructure environments and stop a hack. The breach involved...
Recent Comments