DraftKings users saw $300,000 stolen from their accounts, but the money has since been refunded.
Threat actors could use leaked APIs to send fraudulent emails to Android users, and exfiltrate mailing lists.
A sample of the company's data allegedly showing API keys and guest data was published on an underground forum.
Updated We list the best privacy tools and anonymous browsers, to make it simple and easy to protect your privacy and data against unauthorized third-parties access.
We feature the best small and medium business firewall software, to make it simple and easy to monitor and control access to your IT network.
Server configurations, insecure dependencies, and information leakage are the most common types of flaws, report finds.
New Apple security tools help protect both public figures and regular consumers against cyberattackers.
Internet Explorer may have officially been retired, but it's still used by Office, Google researchers found.
Zero Trust security protocols have a lot to offer, but most businesses don't feel the urgency to switch.