Researchers warned that threat actors could potentially exploit Elastic IP transfer and compromise an IP address
Boost Your Page Load Times with Performance Engineering, Part 1 of 5
Get up to speed with web performance, the Core Web Vitals, and other metrics to increase your revenue and rank your page higher on Google.
UK Privacy Regulator Names and Shames Breached Firms
ICO publishes detailed list of complaints and investigations
Fortnite Dev to Pay $520m in Record-Breaking Settlement
FTC reveals gaming firm’s privacy violations and design tricks
Ukraine’s Delta Military Intel System Hit by Attacks
Phishing campaign spotted by CERT-UA
Ransomware Groups to Increase Zero-Day Exploit-Based Access Methods in the Future
Trend Micro’s latest research paper analyzed ways in which ransomware groups could evolve to stay on top of strengthened cyber-protection measures
Meta Takes Down Over 200 Covert Influence Operations Since 2017
The most common location for influence operations was Russia, according to Meta
Mobile App Users at Risk as API Keys of Email Marketing Services Exposed
Leaked API keys allow threat actors to perform a variety of unauthorized actions
NIST to Scrap SHA-1 Algorithm by 2030
The agency said it will stop using SHA-1 in its last remaining specified protocols by December 31 2030
API Vulnerabilities Discovered in LEGO Marketplace
The vulnerabilities, which are now fixed, could have put sensitive customer data at risk