Internet Archive Gets Pummeled in Round 2 Breach
This latest breach was through Zendesk, a customer service platform that the organization uses. This latest breach was through Zendesk,…
Anti-Bot Services Help Cybercrooks Bypass Google ‘Red Page’
The emergence of novel anti-detection kits for sale on the Dark Web limit the effectiveness of a Chrome browser feature…
TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns
New variants of an Android banking trojan called TrickMo have been found to harbor previously undocumented features to steal a…
WordPress Plugin Jetpack Patches Major Vulnerability Affecting 27 Million Sites
The maintainers of the Jetpack WordPress plugin have released a security update to remediate a critical vulnerability that could allow…
TrickMo malware steals Android PINs using fake lock screen
Forty new variants of the TrickMo Android banking trojan have been identified in the wild, linked to 16 droppers and…
Pokemon dev Game Freak confirms breach after stolen data leaks online
Japanese video game developer Game Freak has confirmed it suffered a cyberattack in August after source code and game designs…
Why Your Identity Is the Key to Modernizing Cybersecurity
Ultimately, the goal of creating a trusted environment around all digital assets and devices is about modernizing the way you…
THN Cybersecurity Recap: Top Threats, Tools and Trends (Oct 7 – Oct 13)
Hey there, it’s your weekly dose of “what the heck is going on in cybersecurity land” – and trust me,…