by Liquid Video Technologies | Feb 8, 2021 | Cybersecurity, Data Breaches, Network Security, Security Breach, Technology News
New details have emerged about a vast network of rogue extensions for Chrome and Edge browsers that were found hijacking clicks to links in search results pages to arbitrary URLs, including phishing sites and ads. Collectively called “CacheFlow” by Avast,...
by Liquid Video Technologies | Feb 3, 2021 | Cybersecurity, Data Breaches, News, Security, Security Breach
An anonymous researcher identified bugs in the software kernel and WebKit browser engine on Apple iOS that are likely part of an exploit chain. Apple continues to put out potential security fires by patching zero-day vulnerabilities, releasing an emergency update this...
by Liquid Video Technologies | Feb 1, 2021 | Cybersecurity, Data Breaches, Security Breach
Another day, and another report that a cryptocurrency exchange has been breached by malicious hackers. Indian cryptocurrency exchange BuyUCoin says that is investigating claims that sensitive data related to hundreds of thousands of its users has been published on the...
by Liquid Video Technologies | Jan 20, 2021 | Cybersecurity, Data Breaches, Network Security, Networking, Security, Security Breach, Technology News, Uncategorized
Why Designated DNS-over-HTTPS? The U.S. National Security Agency (NSA) on Friday said DNS over HTTPS (DoH) — if configured appropriately in enterprise environments — can help prevent “numerous” initial access, command-and-control, and exfiltration...
by Liquid Video Technologies | Jan 15, 2021 | Cybersecurity, Data Breaches, Security Breach
There is no question that attackers are going after your sensitive account data. Passwords have long been a target of those looking to compromise your environment. Why would an attacker take the long, complicated way if they have the keys to the front door? No matter...
by Liquid Video Technologies | Jan 11, 2021 | Cybersecurity, Data Breaches, Hacker, Security Breach
Cybersecurity researchers on Thursday disclosed details of a previously undiscovered in-memory Windows backdoor developed by a hacker-for-hire operation that can execute remotely malicious code and steal sensitive information from its targets in Asia, Europe, and the...
Recent Comments