A new report by TRM Labs reveals the culprits responsible for nearly 33% of all cryptocurrencies stolen through hacking incidents in 2023 – North Korea.
The report...
A new report by Computer scientists from the National Institute of Standards and Technology presents new kinds of cyberattacks that can “poison” AI systems.
AI...
As threat actors use artificial intelligence to their advantage, it’s essential that organizations evolve along with them to respond to and prevent these threats.
One...
Researchers from Singapore managed to trick three chatbots- ChatGPT, Google Bard, and Microsoft Bing- into breaking the rules, then turned them against each other.
A...
Written by Or Shalom
OT (Operation Technologies) is in charge of physical operational processes for different needs in various sectors. They function as production lines...
17-year-old Kai Zhuang, a Chinese exchange student, was reportedly found freezing in a tent in Utah after being reported missing by his high school....
The operator of Europe's largest parking app EasyPark Group was recently a victim of a major data breach that compromised the personal information of...
The ever-evolving cybersecurity landscape promises to bring new cyber threat actors, vulnerabilities, and weaknesses to counter, and as technology evolves, so do cyber threat...
An Iranian cybergang called “Cyber Toufan” has leaked data from 49 Israeli firms according to threat Intelligence platform FalconFeedsio. The cybergang itself claimed responsibility...
According to a new report, some of the most active and dangerous ransomware groups in the world- like Akira, ALPHV/BlackCat, Lockbit, Royal, and Black...
The six-month-long Operation HAECHI IV was an international law enforcement effort targeting online financial crime, and it has resulted in nearly 3,500 arrests and...
A new report by the federal Integrated Terrorism Assessment Centre (ITAC) in Canada warns that deepfakes pose a persistent threat to public safety, especially...
China has issued a draft for a new Contingency plan for data security incidents, which involves very strict deadlines for large breaches.
China recently proposed...
Nowadays, many malicious elements online use AI to digitally expand their operations, and experts claim that such AI-generated fraud is only expected to worsen.
This...
UK’s National Crime Agency claims that Meta’s new default end-to-end encryption feature for Messenger will hinder law enforcement’s ability to analyze reports and investigate...
The International Criminal Police Organization claims its first operation targeting human-trafficking-fueled cyber fraud shows that the criminal industry is going global, spreading beyond its...
Cybersecurity researchers investigated conversations between hackers and analyzed trending topics on one of the dark web’s largest hacker forums and compiled a list of...
Microsoft Outlook was reportedly targeted over 10,000 times this summer by a single threat actor, which is believed to be aligned with Russia.
Cybersecurity company...