Crypto hackers targeting iPhone users: CryptoRom scam involves snagging victims through Bumble, Tinder, Grindr, apps
Discovering sensitive data exposure by viewing page source, and responsibly reporting the same to get it fixed is branded as ‘hacking’
GETTR suffers data breach and multiple profiles defaced: Twitter clone data scraping leaves more than 87,000 user profiles exposed
Ethical hacker breached defenses of 35 companies using ‘Dependency Confusion’ supply-chain hack and popular open-source software repositories
Instagram is offering ‘Recently Deleted’ section to add an extra layer of protection and ability to restore posts