Puma Sportswear Recently Impacted By A Data Breach
We have recently learned that Puma Sportswear was impacted by a data breach in the waning days of 2021. It's important to note that Puma's networks were not attacked directly. The attack ...
We have recently learned that Puma Sportswear was impacted by a data breach in the waning days of 2021. It's important to note that Puma's networks were not attacked directly. The attack ...
Do you use Microsoft Teams and do you have an older PC that struggles with Teams video meetings? If so there's good news. Microsoft has recently upgraded Teams and halved the power ...
There are two new forms of malware spreading rapidly among people with Android devices according to researchers at ThreatFabric. This latest campaign involves the FluBot malware (also known as Cabassous) and the ...
According to researchers at HP, there's a new threat to worry about. Hackers have recently begun disguising malware as Windows 11 upgrades and are using them to target Windows 10 users who ...
Hackers will attack absolutely anybody. No one is safe and nothing is sacred. Not even football is safe. The most recent high-profile attack was made against the San Francisco 49ers according to ...
It's no secret that supply chain issues have impacted a variety of different industries. Apple has been somewhat less impacted than others. Leveraging this and their massive infrastructure and marketing budget, they ...
Researchers from Fortinet are warning of a new threat to be on the lookout for. Right now, NFTs are all the rage. Everyone is talking about them, and many are excited about ...
Researchers at Avanan are a Check Point subsidiary. They have recently issued a warning that anyone who uses Microsoft Teams should be aware of. According to the latest statistics, more than 270 ...
For most of the history of the internet Linux has been able to stay below the radar of hackers around the world. While there have been some attacks that specifically targeted Linux ...
Researchers have spotted a new phishing campaign you should be aware of. What sets this one apart is that the hackers are using a lowly but specially crafted CSV file to infect ...