Stay updated with the latest developments in Cybersecurity! This covers everything from news and updates to tips and tutorials that help you maximize your security.
Check back for updates.
Hackers Hijack Unsecured Jupyter Notebooks To Stream Illegal Sports Broadcasts
Malicious actors are exploiting misconfigured JupyterLab and Jupyter Notebooks to conduct stream ripping and ...
Privileged accounts are well-known gateways for potential security threats. However, many organizations focus solely on managing privileged access—rather than ...
U.S. telecoms giant T-Mobile has confirmed that it was also among the companies that were targeted by Chinese threat actors to gain access to valuable information.
Threat Actor Turns Thousands of IoT Devices Into Residential Proxies
A threat actor tracked as Water Barghest has compromised over 20,000 IoT devices and monetizes them as residential proxies.
Hackers Redirect $250,000 Payment in iLearningEngines Cyberattack
AI-powered learning automation firm iLearningEngines has been targeted in a cyberattack that resulted in the theft of $250,000.
Akira Ransomware Drops 30 Victims on Leak Site In One Day
Cyberint has observed the Akira ransomware group leaking in a single day the information allegedly stolen from 32 victims.
Phobos Ransomware Admin Extradited As Part Of International Hacking Operation
A 42-year-old Russian national, Evgenii Ptitsyn has been extradited from South Korea to the United States to face charges related to his alleged role...
Hackers Using Sitting Ducks Attack To Hijack Domains, 1 Million Domains Vulnerable
Over 1 million registered domains could be vulnerable to a cyberattack method known as “Sitting Ducks,” as recently unveiled in a new report from Infoblox Threat Intel.
Don’t Hold Down The Ctrl Key—New Warning As Cyber Attacks Confirmed
Sometimes, the oldest cyber attacks in the book emerge with a new and worrying twist—here’s why you shouldn’t always hold down the Ctrl key when instructed.
Fake Discount Sites Exploit Black Friday to Hijack Shopper Information
A new phishing campaign is targeting e-commerce shoppers in Europe and the United States with bogus pages that mimick …
NSO Group Exploited WhatsApp to Install Pegasus Spyware Even After Meta's Lawsuit
Legal documents released as part of an ongoing legal tussle between Meta's WhatsApp and NSO Group have revealed that ...
Fortinet VPN Zero-Day Exploited in Malware Attacks Remains Unpatched: Report
The DeepData malware framework was seen exploiting a Fortinet VPN client for Windows zero-day that remains unpatched.
Palo Alto Networks Releases IoCs for New Firewall Zero-Day
Palo Alto Networks has released IoCs for the attacks exploiting a newly uncovered firewall zero-day vulnerability.
Windows Zero-Day Exploited by Russia Triggered With File Drag-and-Drop, Delete Actions
The exploit for a new zero-day vulnerability in Windows is executed by deleting files, drag-and-dropping them, or right clicking on them.
T-Mobile Hacked – China Launched Massive Cyber Attack on U.S. Telecom Networks
Hackers with ties to Chinese intelligence infiltrated multiple U.S. and international telecom companies, including T-Mobile, in a prolonged cyber-espionage campaign aimed at high-value intelligence...
Homeland Security Department Releases Framework for Using AI in Critical Infrastructure
The framework recommends that AI developers evaluate potentially dangerous capabilities in their products, ensure their products align with “human-centric values” and protect users’ privacy.
PAN-OS Firewall Vulnerability Under Active Exploitation – IoCs Released
Palo Alto Networks has released new indicators of compromise (IoCs) a day after the network security vendor confirmed that a new zero-day …
Hackers Leveraging Extended Attributes To Evade Detection In macOS Systems
Researchers discovered a novel approach employed by the threat actor to conceal codes using Extended Attributes to avoid detection in macOS devices. Extended attributes are...
Russian Hackers Exploit New NTLM Flaw to Deploy RAT Malware via Phishing Emails
A newly patched security flaw impacting Windows NT LAN Manager (NTLM) was exploited as a zero-day by a suspected Russia-linked actor as part of cyber attacks targeting Ukraine.
U.S. Confirms China-Backed Hackers Breached Telecom Providers To Steal Wiretap Data
The U.S. government has confirmed that hackers with links to China breached multiple U.S. telecommunication service providers to access the wiretap systems used by law enforcement to surveil Americans.
Was Amazon Hacked—Have Your Account And Password Been Compromised?
Amazon has confirmed that some data was breached during the spate of MOVEit software exploits that started during May 2023.
The security vulnerabilities are among the 90 security bugs the tech giant addressed as part of its Patch Tuesday update for November 2024.
In the same week that Microsoft issued its Patch Tuesday round of security updates, Google issued an update warning for all users as 12...
China's Hacker Army Outshines America
Hacking competitions and the Chinese government's cultivation of cyber talent have allowed the country to pull ahead, officials are warning.
Quantum Computing Threatens Cybersecurity: Are We Prepared?
As quantum computing grows, researchers are urgently preparing for its impact on cybersecurity by developing quantum-resistant cryptographic protocols.
Has the Cybersecurity Workforce Peaked?
Criticism of the latest rosy stats that seem to support a hot market for qualified cyber pros.
CISA provides information on cybersecurity best practices to help individuals and organizations implement preventative measures and manage cyber risks.
Learn how to protect yourself, your family and your home with these tips and resources
Organizations of all sizes need to keep their data, employees and customers safe and secure. Learn how to protect your business with these resources.
Explore our collection of resources on current and emerging forms of cybercrime and illegal online activities.
The ROI of Security Investments: How Cybersecurity Leaders Prove It
Cyber threats are intensifying, and cybersecurity has become critical to business operations.
Top Cybersecurity Threats, Tools, and Practices
We're talking password-stealing bots, sneaky extensions that spy on you, and even cloud-hacking ninjas.
Learn job-ready skills that are in-demand, like how to identify and mitigate common risks, threats, and vulnerabilities — and discover how to effectively utilize AI in cybersecurity.
|