New threat lets attackers collect and spoof browser’s digital fingerprints.

Views expressed in this cybersecurity-cybercrime-intelligence update are those of the reporters and correspondents.

Accessed on 25 October 2021, 2029 UTC.

Content provided by “The Hacker News.”


Please click link or scroll down to read your selections.

The Hacker News Daily Updates

Aite-Novarica Research Report: Zero Trust Starts with Identity — Protecting Active Directory

An In-depth comparison of Active Directory security solutions from Attivo Networks, CrowdStrike, QOMPLX, Microsoft, and Tenable.

Download Now Sponsored
LATEST NEWS Oct 25, 2021

New Attack Let Attacker Collect and Spoof Browser’s Digital Fingerprints

A “potentially devastating and hard-to-detect threat” could be abused by attackers to collect users’ browser fingerprinting information with the goal of spoofing the victims without their knowledge, thus effectively compromising their privacy. Academics from Texas A&M University dubbed the attack …

Read More

Hardware-grade enterprise authentication without hardware: new SIM security solution for IAM

The average cost of a data breach, according to the latest research by IBM, now stands at USD 4.24 million, the highest reported. The leading cause? Compromised credentials, often caused by human error. Although these findings continue to show an upward trend in the wrong direction, the challenge …

Read More

Free eBook: Understanding Terraform

Terraform is a well-known and widely used tool to manage infrastructure as code. This eBook and audiobook will help you understand the underlying concepts and how it can be a significant resource when your cloud infrastructure hits critical mass. Download …

Read More

Microsoft Warns of Continued Supply-Chain Attacks by the Nobelium Hacker Group

Nobelium, the threat actor behind the SolarWinds compromise in December 2020, has been behind a new wave of attacks that compromised 14 downstream customers of multiple cloud service providers (CSP), managed service providers (MSP), and other IT services organizations, illustrating the adversary’s …

Read More

Hackers Exploited Popular BillQuick Billing Software to Deploy Ransomware

Cybersecurity researchers on Friday disclosed a now-patched critical vulnerability in multiple versions of a time and billing system called BillQuick that’s being actively exploited by threat actors to deploy ransomware on vulnerable systems. CVE-2021-42258, as the flaw is being tracked as, …

Read More

Closing Critical Gaps in Microsoft 365 Native Security Tools

This ESG whitepaper leverages latest research and insights to outline how to improve your Microsoft 365 security.

Download Now Sponsored

For the latest cybersecurity-cybercrime-intelligence news, please check the blog sidebar, links, and twitter posts. Thanks for joining us today.

Russ Roberts