Cybersecurity

Attackers stole nearly 200,000 North Face accounts by trying passwords

The website of outdoor clothing manufacturer North Face was the target of a credential stuffing attack.   The admins of the North Face website have apparently been asleep: unknown attackers have...

Emergency patch for Microsoft Endpoint Configuration Manager released

Admins should update Microsoft's IT management solution, Endpoint Configuration Manager. Attacks could be imminent.   With Microsoft Endpoint Configuration Manager,...

Twitter Data Breach: Personal Information of Over a Million French Individuals Compromised

Twitter, one of the world's most prominent social media platforms, is grappling with a massive data breach that...

secIT Digital: How to protect companies from targeted cyber attacks

The IT security conference secIT Digital in September is about cyberwar, incident response, secure Active Directory and supply...

Hack against Solana wallets: search for exploit leads to wallet provider Slope

Unknowns were able to loot thousands of Solana cryptocurrency wallets. According to initial analyses, it was the Slope...

Be careful if you receive an email with this subject: it is a scam and seeks to steal all your passwords

Criminals are constantly exploring all the methods that exist to steal our data and extract our passwords. One of the latest scams detected occurs...

Transfer all your savings to another bank account? The new scam you should not fall into

Have you received calls from your bank asking you to transfer all your money to safer bank accounts? It is the new scam that is...

Beware of the WhatsApp ‘Like’ scam: what it is and why it is so dangerous

The National Police warns that there are scammers who pose as social media employees and, supposedly, are willing to offer hundreds of euros a...

The 4 actions you should do so that no one sneaks into your bank application

Although they can be a fantastically useful tool, certain precautions must be taken when using bank management apps. Smartphones have become devices from which much...

This is how they can hack you just by listening to you type

Hackers never stop innovating methods to steal credentials, and one of the latest strategies would require nothing more than a microphone close to someone's...

Twitter Data Breach: Personal Information of Over a Million French Individuals Compromised

Twitter, one of the world's most prominent social media platforms, is grappling with a massive data breach that could have far-reaching consequences for its...