transactions
-
How to Manage Your Attack Surface?
Attack surfaces are growing faster than security teams can keep up. To stay ahead, you need to know what’s exposed…
Read More » -
Exploring the Dark Side: OSINT Tools and Techniques for Unmasking Dark Web Operations
On April 5, 2023, the FBI and Dutch National Police announced the takedown of Genesis Market, one of the largest…
Read More » -
Hackers Exploit WebAPK to Deceive Android Users into Installing Malicious Apps
Threat actors are taking advantage of Android’s WebAPK technology to trick unsuspecting users into installing malicious web apps on Android…
Read More » -
Revolut Faces $20 Million Loss as Attackers Exploit Payment System Weakness
Malicious actors exploited an unknown flaw in Revolut’s payment systems to steal more than $20 million of the company’s funds…
Read More » -
Anatsa Banking Trojan Targeting Users in US, UK, Germany, Austria, and Switzerland
A new Android malware campaign has been observed pushing the Anatsa banking trojan to target banking customers in the U.S.,…
Read More » -
Twitter Hacker Sentenced to 5 Years in Prison for $120,000 Crypto Scam
A U.K. citizen who took part in the massive July 2020 hack of Twitter has been sentenced to five years…
Read More » -
Two Russian Nationals Charged for Masterminding Mt. Gox Crypto Exchange Hack
The U.S. Department of Justice (DoJ) has charged two Russian nationals in connection with masterminding the 2014 digital heist of…
Read More » -
Beware: 1,000+ Fake Cryptocurrency Sites Trap Users in Bogus Rewards Scheme
A previously undetected cryptocurrency scam has leveraged a constellation of over 1,000 fraudulent websites to ensnare users into a bogus…
Read More » -
What to Look for When Selecting a Static Application Security Testing (SAST) Solution
If you’re involved in securing the applications your organization develops, there is no question that Static Application Security Testing (SAST)…
Read More »