Spacelab
TECH CREATORS FESTIVALS  MUSIC
GEAR AI SOCIAL MEDIA GUIDES  

CYBER SECURITY

  CRYPTO
 
     
     
 
     
 

Cybersecurity Latest News & Guides

 
     
 

Stay updated with the latest developments in Cybersecurity!

 

News, updates tips and tutorials that help you maximize your security.

 

For a list of cybersecurity guides and how-tos, click here or scroll farther below.

 

Check back for updates.

 

 

768 CVEs Exploited in 2024, Reflecting a 20% Increase from 639 in 2023

In 2024, cybercriminals upped their game by exploiting 768 CVEs—a 20% increase from 2023—demonstrating their unwavering commitment to job security.

 

PyPI Introduces Archival Status to Alert Users About Unmaintained Python Packages
PyPI's new 'archival status' feature is like slapping a 'Do Not Resuscitate' order on those Python packages that haven't seen daylight since the Jurassic era.

In this week's cybersecurity soap opera, AI chatbots are spilling secrets, law enforcement is crashing cybercrime parties, and Apple is patching holes faster than a ship in a storm.

Coyote malware is broadening its horizons, now targeting over 1,000 sites and 73 financial institutions, making it the overachiever of the cybercrime world.

Attack Surface Management: the cybersecurity equivalent of cleaning out your digital junk drawer before the hackers turn your clutter into their treasure.

 

Crazy Evil Gang Targets Crypto with StealC, AMOS, and Angel Drainer Malware

The 'Crazy Evil' gang is on a crypto crime spree, using malware like StealC, AMOS, and Angel Drainer to pilfer digital assets, showing that even in cybercrime, diversification is key.

 

Hackers Exploit OAuth 2.0 Code Flow Using AiTM Attack on Microsoft Azure AD

Security enthusiasts and professionals are turning their focus towards a new angle on phishing attacks in the identity and access management space.During the "Offensive Entra ID (Azure AD)...

 

KEYPLUG Infrastructure Exposed: Server Configurations and TLS Certificates Revealed

In a recent technical investigation, researchers uncovered critical insights into the infrastructure linked to a suspected Chinese state-backed cyber actor referred to as "RedGolf."...

 

Coyote Malware Launches Stealthy Attack on Windows Systems via LNK Files

FortiGuard Labs has issued a high-severity alert regarding the Coyote Banking Trojan, a sophisticated malware targeting Microsoft Windows users.Over the past month, researchers...

 

New 0-Day Vulnerability in Arm Mali GPU Kernel Driver Exploited in the Wild

On February 3, 2025, Arm disclosed a vulnerability in the Mali GPU Kernel Driver that allows improper GPU processing operations.This issue affects Valhall...

 

CryptoDNA: AI-Powered Cryptojacking Defense Against DDoS Threats in Healthcare IoT

The integration of Internet of Things (IoT) and Internet of Medical (IoM) devices has revolutionized healthcare, enabling real-time monitoring, remote diagnostics, and data-driven decision-making....

 

Microsoft Introduces AI-Generated Team Avatars for Personalization

Tech giant Microsoft has unveiled a groundbreaking feature for its Microsoft Teams platform: AI-generated avatars designed to revolutionize meeting personalization.This innovative feature allows users...

 

Globe Life Ransomware Attack Exposes Personal and Health Data of 850,000+ Users

Globe Life Inc., a prominent insurance provider, has confirmed a major data breach that exposed the personal and health-related information of over 850,000 users.The...

 

NVIDIA GPU Display Drivers Vulnerability Lets Attackers Access Files Remotely

NVIDIA has issued a critical security update to address multiple vulnerabilities in its GPU Display Driver and vGPU software, affecting both Windows and Linux...

 

PyPl Added Project Archival To Stop Attackers to Weaponize Malicious Packages

The Python Package Index (PyPI) has introduced a new feature that allows maintainers to mark projects as archived, signaling that the project is no...

 

Hundreds of thousands have been impacted by data breaches at Asheville Eye Associates and Delta County Memorial Hospital District.

 

A threat actor has infected Casio UK’s website with a web skimmer on all pages, except the typical checkout page.

 

Researchers found a jailbreak method that exposed DeepSeek’s system prompt, while others have analyzed the DDoS attacks aimed at the new gen-AI.

 

Insurance firm Globe Life says a threat actor may have compromised the personal information of roughly 850,000 individuals.

 

Community Health Center, Inc. says hackers stole the personal and health information of over one million individuals.

 

 

Sophos: Gen AI Flaws Could Negatively Impact Cybersecurity

Sophos warns that generative AI in cybersecurity might be the new 'Frankenstein's monster,' with 89% of IT leaders fearing their creation could turn against them.

 

Security Breach: The Legacy of AI in Cybersecurity

AI offers solutions to enduring problems, but keeping pace with hackers will be key.

 

Hackers leverage Google’s phone number, subdomains to attack victims

Scammers are now impersonating Google support, using official phone numbers and subdomains to trick users into handing over their accounts.

 

What's New (And Worrisome) in Quantum Security?

A new generation of quantum computers could render current cryptographic technology approaches useless. Is a solution even possible?

 

Authorities Seize Domains of Popular Hacking Forums in Major Cybercrime Crackdown

Authorities have seized the domains of popular hacking forums like Cracked and Nulled, leaving cybercriminals scrambling for a new clubhouse.

Lightning AI Studio Vulnerability Allowed RCE via Hidden URL Parameter

Lightning AI Studio's hidden URL parameter was an open invitation for hackers to play admin, turning development environments into their personal playgrounds.

 

SOC Analysts - Reimagining Their Role Using AI

SOC analysts are embracing AI to handle alert overload, turning their nightmare into a sci-fi dream team-up.

 

DeepSeek AI Database Exposed: Over 1 Million Log Lines, Secret Keys Leaked

DeepSeek's latest 'open-source' initiative involved leaving over a million sensitive records exposed online, turning transparency into a hacker's delight.

 

Browser syncjacking: new research details worrying hacking technique

Hackers have found a way to turn Chrome's sync feature into their personal backdoor, making your browser's 'sync' more like 'sink.'

 

Unpatched PHP Voyager Flaws Leave Servers Open to One-Click RCE Exploits

Voyager's unpatched PHP flaws are like leaving the backdoor wide open, inviting hackers in for a server-side joyride.


New Aquabot Botnet Exploits CVE-2024-41710 in Mitel Phones for DDoS Attacks

Aquabot is turning Mitel phones into unwitting accomplices in DDoS attacks, exploiting CVE-2024-41710 to conscript them into its botnet army.


Ransomware attack at New York blood services provider – donors turned away during shortage crisis

400 hospitals and med centers across 15 states rely on its products.

 

Wacom says crooks probably swiped customer credit cards from its online checkout

Digital canvas slinger indicates dot-com was skimmed for over a month.

 

US Cyber Agency’s Future Role in Elections Remains Murky Under the Trump Administration

President Donald Trump has yet to name anyone to lead the U.S. Cybersecurity and Infrastructure Security.

 

TeamViewer Patches High-Severity Vulnerability in Windows Applications

TeamViewer has released patches for a high-severity elevation of privilege vulnerability in its client and host applications for Windows.

 

Nulled, Other Cybercrime Websites Seized by Law Enforcement

Several cybercrime websites have been seized in a law enforcement operation, including Nulled, Cracked, Sellix, and StarkRDP.

 

Frederick Health Hit by Ransomware Attack

Maryland healthcare provider Frederick Health has taken some of its systems offline in response to a ransomware attack.

 

152,000 Impacted by Data Breach at Berman & Rabin

Law firm Berman & Rabin says 152,000 people are impacted by a data breach resulting from a July 2024 ransomware attack.

 

Unprotected DeepSeek Database Exposed Chats, Other Sensitive Information

An unprotected database belonging to Chinese AI company DeepSeek exposed highly sensitive information, including chat history, secret keys, and backend data.

 

Tenable to Acquire Vulcan Cyber for $150 Million

Tenable plans to acquire exposure management company Vulcan Cyber for roughly $150 million in cash and stock. 

 

DeepSeek exposed internal database containing chat histories and sensitive data

DeepSeek's latest data leak spilled user chat histories and sensitive info, turning their 'secure' servers into a hacker's buffet.

 

Hackers are hijacking WordPress sites to push Windows and Mac malware

Hackers are hijacking outdated WordPress sites to distribute malware to Windows and Mac users, turning neglected blogs into malware distribution hubs.

 

North Korea’s new hack: stealing data via open-source code

North Korea's Lazarus Group is now sneaking malware into trusted open-source software, turning developers' tools into unwitting accomplices.

 

 

Cybersecurity Guides & How-Tos

 

Top 5 Strategies for Cybersecurity Red Teaming

Red teaming offers a proactive approach to cybersecurity that is most effective when implemented through a strategy that includes collaboration and AI.

 

Cultivating a Hacker Mindset in Cybersecurity Defense

Security isn't just about tools — it's about understanding how the enemy thinks and why they make certain choices.

 

Cybersecurity Best Practices

CISA provides information on cybersecurity best practices to help individuals and organizations implement preventative measures and manage cyber risks.

 

Online Safety + Privacy Basics

Learn how to protect yourself, your family and your home with these tips and resources

 

Cybersecurity for Business

Organizations of all sizes need to keep their data, employees and customers safe and secure. Learn how to protect your business with these resources.


Theft, Fraud + Cybercrime

Explore our collection of resources on current and emerging forms of cybercrime and illegal online activities.

 

The ROI of Security Investments: How Cybersecurity Leaders Prove It
Cyber threats are intensifying, and cybersecurity has become critical to business operations.

 

Top Cybersecurity Threats, Tools, and Practices

We're talking password-stealing bots, sneaky extensions that spy on you, and even cloud-hacking ninjas.

 

Google Cybersecurity Certificate

Learn job-ready skills that are in-demand, like how to identify and mitigate common risks, threats, and vulnerabilities — and discover how to effectively utilize AI in cybersecurity.

 
 
 
     
     
 

 

 
 
Spacelab
A community for music festivals, creators & influencers! A music festival platform, online store and digital magazine.
 
Creative Commons Copyright, 2024. Some Rights Reserved.
Spacelab is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License. MORE >
         
FESTIVALS NEWS STORE CONNECT SPACELAB
USA TECH AMAZON FACEBOOK ABOUT
CANADA CREATORS ETSY INSTAGRAM CONTACT
UK     TWITTER ADVERTISE
AUSTRALIA     RSS PRIVACY
EUROPE       ETHICS
ASIA       FTC DISCLOSURE
2024       SEARCH
2025        
COACHELLA