cyber security compliance Cybersecurity Cynet Incident Response incident response tool Security

Report to Your Management with the Definitive ‘Incident Response for Management’ Presentation Template

Security incidents occur. It’s not a matter of ‘if’ but of ‘when.’ There are security products and procedures that were implemented to optimize the IR process, so from the ‘security-professional’ angle, things are taken care of. However, many security pros who are doing an excellent job in handling incidents find effectively communicating the ongoing process […]

Apple iPhone Cybersecurity Mobile messenger Privacy Security Whatsapp Whatsapp for Android WhatsApp for iOS

WhatsApp ‘Delete for Everyone’ Doesn’t Delete Media Files Sent to iPhone Users

Mistakenly sent a picture to someone via WhatsApp that you shouldn’t have? Well, we’ve all been there, but what’s more unfortunate is that the ‘Delete for Everyone’ feature WhatsApp introduced two years ago contains an unpatched privacy bug, leaving its users with false sense of privacy. WhatsApp and its rival Telegram messenger offer “Delete for […]

Cybersecurity Facebook HHVM High Speed Server php 7 PHP Vulnerability Security server vulnerability Vulnerability Wikipedia

Facebook Patches “Memory Disclosure Using JPEG Images” Flaws in HHVM Servers

Facebook has patched two high-severity vulnerabilities in its server application that could have allowed remote attackers to unauthorisedly obtain sensitive information or cause a denial of service just by uploading a maliciously constructed JPEG image file. The vulnerabilities reside in HHVM (HipHop Virtual Machine)—a high-performance, open source virtual machine developed by Facebook for executing programs […]

browser cookies browser security cryptocurrency mining Cryptominer Cybersecurity Firefox online tracking Privacy Security third party cookies

Firefox 69 Now Blocks 3rd-Party Tracking Cookies and Cryptominers By Default

Mozilla has finally enabled the “Enhanced Tracking Protection” feature for all of its web browser users worldwide by default with the official launch of Firefox 69 for Windows, Mac, Linux, and Android. The company enabled the “Enhanced Tracking Protection” setting by default for its browser in June this year, but only for new users who […]

BMC vulnerability chipset vulnerability Cybersecurity hacking news Hardware motherboard hacking Security Supermicro Servers web server security

BMC Vulnerabilities Expose Supermicro Servers to Remote USB-Attacks

Enterprise servers powered by Supermicro motherboards can remotely be compromised by virtually plugging in malicious USB devices, cybersecurity researchers at firmware security company Eclypsium told The Hacker News. Yes, that’s correct. You can launch all types of USB attacks against vulnerable Supermicro servers without actually physically accessing them or waiting for your victim to pick […]

Android App Artificial Intelligence Cybersecurity Deepfake Privacy Privacy Breach Security Viral App

Chinese Face-Swapping App ZAO Sparks Privacy Concerns After Going Crazily Viral

What could be more exciting than seeing yourself starring alongside your favorite actor in a movie, music video, or TV program? Yes, that’s possible—well, kind of, by using a new AI-based deepfake app that has gone viral in China over this weekend, climbing to the top of the free apps list in the Chinese iOS […]

Apple Apple Siri Cybersecurity intelligent personal assistant online privacy Online security Privacy Privacy Breach Security

Apple Changes the Way It Listens to Your Siri Recordings Following Privacy Concerns

Apple today announced some major changes to its controversial ‘Siri audio grading program’ following criticism for employing humans to listen to audio recordings of users collected via its voice-controlled Siri personal assistant without their knowledge or consent. The move came a month after The Guardian reported that third-party contractors were regularly listening to private conversations […]

botnet botnet malware computer virus Cyber Attack Cybersecurity hacking news keylogger Malware RETADUP RETADUP botnet RETADUP malware Security

French Police Remotely Removed RETADUP Malware from 850,000 Infected PCs

The French law enforcement agency, National Gendarmerie, today announced the successful takedown of one of the largest wide-spread RETADUP botnet malware and how it remotely disinfected more than 850,000 computers worldwide with the help of researchers. Earlier this year, security researchers at Avast antivirus firm, who were actively monitoring the activities of RETADUP botnet, discovered […]

Cyber Crime cybercriminals Cybersecurity email scams hacking news phishing attack Phishing scam Security

Hacker Ordered to Pay Back Nearly £1 Million to Phishing Victims

A prolific hacker who carried out phishing scams against hundreds of companies worldwide has been ordered to pay back more than $1.1 million (over £922,000) worth of cryptocurrencies to his victims. Grant West, a 27-year-old resident of Kent, England, targeted several well-known companies around the world since 2015 to obtain the financial data of tens […]

Cybersecurity Event Logs Security WordPress WordPress Activity Logs Wordpress hacking wordpress security WordPress SEO

How Activity Logs Help WordPress Admins Better Manage Website Security

Managing a WordPress website can sap a lot of your time and energy, which otherwise you’d spend on managing your business. If you’re looking to cut down on the hours, you spend troubleshooting WordPress technical and security problems, better managing and monitoring your website and users, or your customers, you need a WordPress activity log […]