Ty Mezquita — CyberHootinSystem WeaknessRestaurant Ordering Platforms Targeted By HackersCustomers from over 300 restaurants’ had payment card details stolen in web-skimming campaigns targeting three online ordering platforms…Jul 26, 2022Jul 26, 2022
Ty Mezquita — CyberHootinSystem WeaknessSecurity Advisory: Critical Patches in Adobe and Microsoft ProductsCyberHoot Vulnerability Alert Management Process (VAMP) Rating: Critical/RedJul 19, 2022Jul 19, 2022
Ty Mezquita — CyberHootinSystem Weakness1 Billion Records Exposed in Chinese Data LeakChina has landed in the middle of one of the largest data breaches of all time after a government developer wrote a blog post on a popular…Jul 12, 2022Jul 12, 2022
Ty Mezquita — CyberHootinSystem WeaknessBiometric Authentication Ring Gaining TractionToken Ring the new company (not the old networking token ring technology), just received Series C investment that will accelerate growth…Jul 5, 2022Jul 5, 2022
Ty Mezquita — CyberHootinSystem WeaknessRefund Vishing ScamsWe’re constantly receiving emails, text messages, and phone calls from scammers claiming to be reputable brands we use. What you may not…Jun 28, 2022Jun 28, 2022
Ty Mezquita — CyberHootinSystem WeaknessRansomware Insurance: Prescriptive and RestrictiveInsurers are drafting more restrictive and prescriptive insurance policy requirements designed to reduce the number of claims and better…Jun 21, 20221Jun 21, 20221
Ty Mezquita — CyberHootSecurity Advisory: Adobe Vulnerabilities Allow Arbitrary Code ExecutionCyberHoot Vulnerability Alert Management Process Rating (VAMP): Critical/RedJun 16, 2022Jun 16, 2022
Ty Mezquita — CyberHootinSystem WeaknessSmartphones Tracked Through Bluetooth SignalsA group of engineers at the University of California San Diego has shown for the first time that the Bluetooth signals emitted by our…Jun 14, 2022Jun 14, 2022
Ty Mezquita — CyberHootinSystem WeaknessSecurity Advisory: Android UNISOC Chip VulnerabilityCyberHoot Vulnerability Alert Management Process Rating (VAMP): Critical/RedJun 8, 2022Jun 8, 2022
Ty Mezquita — CyberHootinSystem WeaknessSaaS Application Access Creates Security ConcernsSoftware as a Service (SaaS) applications have transformed businesses over the last decade with enormous value. The pandemic forced many…Jun 7, 2022Jun 7, 2022