image provided by pixabay

Malicious Actors Using YouTube to Distribute Malware

0
Information stealing malware is being delivered on YouTube disguised as pirated software and video game “cracks,” reports cybersecurity firm Proofpoint. This malware (including Vidar, StealC,...
image provided by pixabay

Malware Can Hear Your Keyboard Strokes and Reveal Your Password

0
Research reveals that keystroke sounds can be exploited by malicious actors to reveal sensitive user data, like the text that users are typing into...
image provided by pixabay

Telecommunications Giant Faces Huge Data Breach, Resets Millions of Passcodes

0
The telecommunications company AT&T reported last week that a dataset found on the dark web contains information like the Social Security numbers of about...
image provided by pixabay

The Phishing Platform Automating Cybercrime

0
Darcula is a new Chinese-language phishing-as-a-service platform with more than 20,000 phishing domains that target organizations in over 100 countries. While the concept of an...
image provided by pixabay

This Malware Is Stealing Your Cookies, With Devastating Consequences

0
Threat actors have a new tactic to access users’ credentials without knowing them already or launching a multi-factor authentication challenge. One of the most common...
Images provided by pixabay

Chinese Spy Agencies’ Cyberattacks are Getting Bolder

0
Analysts report that cyberattacks linked to Chinese intelligence agencies are rapidly increasing both in frequency and capability, as they seek to test foreign government...
image provided by pixabay

German Authorities Bring Down Darknet Marketplace ‘Nemesis Market’

0
The illegal darknet marketplace Nemesis Market, based in Germany and Lithuania, was recently seized by the Frankfurt Main Public Prosecutor’s Office, the Central Office...
image provided by pixabay

Russia Unleashes a Dangerous New Wiper

0
Russia is reportedly using a new and extremely capable malware variant to target Ukrainian telecommunication networks. Cybersecurity threat intelligence platform SentinelLabs reports the new Russian...
images provided by pixabay

Experts Warn Cybersecurity Attacks Can Cripple Healthcare

0
The healthcare industry needs to wake up and focus on securing its infrastructure. We have reported on many cyberattacks on various health infrastructures, hospitals, and...
image provided by pixabay

North Korean Hackers use Nuclear Threat to Trick Victims

0
North Korea’s nuclear threats are reportedly being used and exploited by North Korean hackers as a “lure” to make victims open malicious files and...
images provided by pixabay

Hacktivists Hack Israeli Nuclear Facility

0
The hacktivist group ‘Anonymous’ has claimed a recent breach of Israel’s nuclear facility networks in Dimona as a protest against the war with Gaza....
image provided by pixabay

Microsoft’s New AI Hacker Tracker

0
Microsoft set to release Copilot for Security AI tool to help cybersecurity workers produce summaries of suspicious incidents and identify hackers’ methods to conceal...
image provided by pixabay

ChatGPT Plugins Vulnerable to Threat Actors

0
Software company Salt Labs reveals that ChatGPT plugins that let it interact with external programs and services have vulnerabilities that could be exploited during...
image provided by pixabay

French Government Hit with Severe Cyberattacks

0
Several government departments in France fell victim to multiple cyberattacks of "unprecedented intensity,” and hacktivist group Anonymous Sudan is claiming responsibility. The French Prime Minister’s...
image provided by pixabay

North Korean Hackers Steal South Korean Funds And Secrets

0
North Korean hackers have stolen vital microchip information from South Korean chip makers, according to reports from South Korea’s National Intelligence Service (NIS). “We believe...
image provided by pixabay

New Approach Revolutionizes Quantum Computer Cybersecurity

0
Quantum computers can solve complex problems exponentially faster than classical computers and are hailed as the future of computing; however, they are still vulnerable...
image provided by pixabay

New Malicious “AI Worm” Threatens Generative AI Tools

0
Many companies are integrating generative AI tools into their products to reduce the human workload and make hard tasks easier, which is both transformative...
images provided by pixabay

No Search Warrant, No IP Address

0
Canada’s Supreme Court rules that the Canadian police won’t be able to access an IP address without a search warrant. This case was brought to...
image provided by pixabay

Lightning Never Strikes Twice? Ransomware Attackers Seen Regularly Repeating Previous Attacks

0
Cybersecurity company Cybereason reveals that the actual price of a ransomware attack on a business includes much more than the ransom itself. When choosing whether...
Images provided by pixabay

China is Boosting its Cyber Defenses in Fear of Cyberattacks and...

0
China reportedly intends to improve the data security of its industrial sector in order to effectively contain any “major risks,” a process that is...
image provided by pixabay

The Rise of Romance Crypto-Scamming

0
Malicious romance cybercriminal steals close to a quarter million dollars from a victim in a months-long online scam. This type of online scam is also...
images provided by pixabay

New Type of Cyberattack Uses Wireless Charger to Set Your Smartphone...

0
Security experts from the University of Florida worked with CertiK and found a certain class of cyberattacks that could cause a smartphone to catch...

Latest

image provided by pixabay

“Responsible AI” – The Solution to the Deepfake Threat?

0
Several months ago, thousands of Democratic New Hampshire voters received a telephone call from none other than US President Joe Biden urging them not...