These are some of the key findings from the latest Check Point Research Most Wanted report
Apple Fixes Actively Exploited iPhone Zero-Day Vulnerability
The vulnerability could allow remote code execution (RCE) on a victim’s device
You?ve Crossed the Line ? Disturbing a Host?s Rest
Akamai researchers explore two new vulnerabilities that can be exploited to lead to denial-of-service attacks against container and session services.
New Google Tool Helps Devs Root Out Open Source Bugs
Free OSV-Scanner searches transitive dependencies
Loan Fee Fraud Surges by a Fifth as Christmas Approaches
FCA warns of pressure tactics as cost of living bites
Twitter Addresses November Data Leak Claims
No passwords were reportedly exposed, but Twitter prompted users to enable 2FA to protect accounts
California Hit By Cyber-Attack, LockBit Claims Responsibility
At the time of writing, the California Budget website remains offline
Uber Hit By New Data Breach After Attack on Third-Party Vendor
Company information was stolen from third-party vendor Teqtivity and posted on a dark web forum
Akamai Welcomed Partners to a Memorable Asia-Pacific and Japan Partner Summit
Learn about the recent Akamai APJ Partner Summit 2022, including new revenue opportunities for our partners ? and the awards we gave.