KEEP IN TOUCH
Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!
Hackers Share Methods To Bypass 3D Secure For Payment Cards Cybercriminals are constantly exploring and documenting new ways to go around the 3D Secure (3DS) protocol used for authorizing online card transactions. Discussions on underground forums offer advice on how to bypass the latest variant of the security feature by combining social engineering with phishing
Investors Are The Next Target Of Large-scale Cyberattacks Business email compromise (BEC) scammers are utilizing a new type of attack targeting investors that could leverage payouts seven times greater than average. When an investor buys into a firm’s investment fund, such as private equity or real estate fund, the firm may ask the investor to
GRUB2 Boot Loader Reveals Multiple High Severity Vulnerabilities GRUB, a popular boot loader used by Unix-based operating systems has fixed multiple high severity vulnerabilities. In 2020, BleepingComputer had reported on the BootHole vulnerability in GRUB2 that could have let attackers compromise an operating system’s booting process even if the Secure Boot verification mechanism was active. Threat actors could further abuse the flaw
US Government Warns Of Social Security Scams Using Fake Federal IDs Government imposter scams now come with a new twist that has the potential to make them even more effective, as the Inspector General for the Social Security Administration (SSA) warns. Fraudsters behind this type of scam (which commonly involves attempts to collect Social Security