Cyber Security
Researchers have discovered at least 9,000 exposed VNC (virtual network computing) endpoints that can be accessed and used without authentication, allowing threat actors easy...
Hi, what are you looking for?
Researchers have discovered at least 9,000 exposed VNC (virtual network computing) endpoints that can be accessed and used without authentication, allowing threat actors easy...
The English Premier League has introduced two-factor authentication (2FA) controls to its official Fantasy Premier League game (FPL), offering football fans the option to secure their...
Fewer than half of small and medium-sized businesses are using multi-factor authentication (MFA) to secure critical data, according to new research. The Cyber Readiness Institute’s Global Small...
An eye-watering 24 billion usernames and passwords available on the dark web – an increase of 65% in just two years, according to a new study...
Malicious actors can take unauthorized ownership of online accounts even before their victims sign up for services, according to new research backed by the...
GitLab has patched a critical vulnerability that meant static passwords were inadvertently set during OmniAuth-based registration – putting accounts at risk of malicious takeover. The DevOps...
TV and movie subtitles website OpenSubtitles has instructed users to re-secure their accounts after sending them their passwords in plaintext. The website, which allows users to...
Vulnerabilities in CMS platform Umbraco could allow an attacker to takeover a user’s account, researchers warn. Umbraco is a free and popular open source content management...
The cryptographic protocol is at the heart of a ‘zero trust’ proposal pioneered by Google that has a fan base within the federal government....
Software code repositories could be harboring organizations’ credentials, secrets, and other sensitive data without developers’ knowledge – and this information could provide an invaluable...
Recent Comments