The influx of customers and transactions during the holiday season may be great for business, but it also means that retailers are particularly vulnerable to cyberattacks. From phishing scams to data breaches, cybercriminals are constantly looking for ways to take advantage of the holiday rush. Here are five common cyber risks that retailers should be […]
Category Archives: Security
During the holidays, retailers can feel overwhelmed by the number of tasks they need to complete. But while keeping up with the holiday rush, they also need to be vigilant about potential cyberthreats. With more customers shopping online and increased payment activity, there are several risks that can affect retailers during this time. Below are […]
Palo Alto Networks is warning that a critical zero-day vulnerability on Next-Generation Firewalls (NGFW) management interfaces, currently tracked as ‘PAN-SA-2024-0015,’ is actively being exploited in attacks. […] Go to Source Author: Bill Toulas
A financially motivated Chinese threat actor dubbed “SilkSpecter” is using thousands of fake online stores to steal the payment card details of online shoppers in the U.S. and Europe. […] Go to Source Author: Bill Toulas
CISA warned today that two more critical security vulnerabilities in Palo Alto Networks’ Expedition migration tool are now actively exploited in attacks. […] Go to Source Author: Sergiu Gatlan
New Glove Stealer information-stealing malware can bypass Google Chrome’s Application-Bound (App-Bound) encryption to steal browser cookies. […] Go to Source Author: Sergiu Gatlan
New Glove Stealer information-stealing malware can bypass Google Chrome’s Application-Bound (App-Bound) encryption to steal browser cookies. […] Go to Source Author: Sergiu Gatlan
Robert Purbeck, a 45-year-old man from Idaho, has been sentenced to ten years in prison for hacking at least 19 organizations in the United States, stealing the personal data of more than 132,000 people, and multiple extortion attempts. […] Go to Source Author: Bill Toulas
Hackers are using a novel technique that abuses extended attributes for macOS files to deliver a new trojan that researchers call RustyAttr. […] Go to Source Author: Bill Toulas
OpenAI’s containerized ChatGPT environment is open to limited yet extensive access to core instructions while allowing arbitrary file uploads and command execution within the isolated sandbox. […] Go to Source Author: Bill Toulas


