New variants of Agent Tesla remote access Trojan now come with modules dedicated to stealing credentials from applications including popular…
Browsing: Identity and Access Management (IAM)
A new high severity WordPress vulnerability has been found in a Facebook chat plugin, which has been installed on over…
London, UK – August 5th, 2020 – LastPass by LogMeIn today unveiled a new Security Dashboard, providing end-users with a complete overview of the…
As reported by The Guardian, hackers have carried out a “malicious” cyber attack on Telstra, creating connectivity issues for some home internet…
France-based major hardware wallet provider Ledger has admitted it suffered a data breach on June 17 that appears to have allowed a “third party”…
Following the major security breach suffered by Twitter on 15 July, it has confirmed that the hack targeted a small number of…
Securing customer trust is one of the most vital things a Communications Service Provider (CSP) can do to not only…
Now, the intense race is on between development and security. Thanks to the rapid technological advancements and changing trends that…
Identity thieves who specialise in running up unauthorized lines of credit in the names of small businesses are having a…
WhatsApp has confirmed that a leading pro-independence politician in Catalonia was the target of a phone-hacking described by experts as…