Credential-Stuffing Attack Hits The North Face
The North Face has reset an undisclosed number of customer accounts after detecting a credential-stuffing attack on its website. Continue reading Credential-Stuffing Attack Hits The North Face
Collaborate Disseminate
The North Face has reset an undisclosed number of customer accounts after detecting a credential-stuffing attack on its website. Continue reading Credential-Stuffing Attack Hits The North Face
Animal Jam, just the latest in a string of attacks on gaming apps, has adopted a transparent communications strategy after stolen data turned up on a criminal forum. Continue reading Animal Jam Hacked, 46M Records Roam the Dark Web
Hacker forums are a rich source of threat intelligence. Continue reading Digging into the Dark Web: How Security Researchers Learn to Think Like the Bad Guys
Both Nvidia and Intel faced severe security issues this week – including a high-severity bug in Nvidia’s GeForce NOW. Continue reading Nvidia Warns Windows Gamers of GeForce NOW Flaw
Following a Nov. 3 ransomware attack against Campari, Ragnar Locker group took out public Facebook ads threatening to release stolen data. Continue reading Ragnar Locker Ransomware Gang Takes Out Facebook Ads in Key New Tactic
Microsoft warns that cybercriminals are using Cobalt Strike to infect entire networks beyond the infection point, according to a report. Continue reading Microsoft Teams Users Under Attack in ‘FakeUpdates’ Malware Campaign
The cyberattack has halted chemotherapy, mammogram and screening appointments, and led to 300 staff being furloughed or reassigned. Continue reading Cyberattack on UVM Health Network Impedes Chemotherapy Appointments
An attack on the Microsoft Exchange server of an organization in Kuwait revealed two never-before-seen Powershell backdoors. Continue reading Microsoft Exchange Attack Exposes New xHunt Backdoors
The illegal marketplace was hacked prior to it’s takedown — the IRS has now tracked down those stolen funds, it said. Continue reading Feds Seize $1B in Bitcoin from Silk Road
The newly discovered malware uses GitHub and Pastebin to house component code, and harbors 12 different initial attack vectors. Continue reading Gitpaste-12 Worm Targets Linux Servers, IoT Devices