When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
The researchers identified at least seven groups that were taking advantage of these vulnerabilities.
Skimmers work by stealing payment information during the checkout process, and sending it to the attackers.
“They should also rotate secret encryption keys, and ensure that old keys are invalidated.”
ViaTheHackerNews