Chinese Spy Agencies’ Cyberattacks are Getting Bolder
Analysts report that cyberattacks linked to Chinese intelligence agencies are rapidly increasing both in frequency and capability, as they seek to test foreign government...
German Authorities Bring Down Darknet Marketplace ‘Nemesis Market’
The illegal darknet marketplace Nemesis Market, based in Germany and Lithuania, was recently seized by the Frankfurt Main Public Prosecutor’s Office, the Central Office...
Russia Unleashes a Dangerous New Wiper
Russia is reportedly using a new and extremely capable malware variant to target Ukrainian telecommunication networks.
Cybersecurity threat intelligence platform SentinelLabs reports the new Russian...
Experts Warn Cybersecurity Attacks Can Cripple Healthcare
The healthcare industry needs to wake up and focus on securing its infrastructure.
We have reported on many cyberattacks on various health infrastructures, hospitals, and...
North Korean Hackers use Nuclear Threat to Trick Victims
North Korea’s nuclear threats are reportedly being used and exploited by North Korean hackers as a “lure” to make victims open malicious files and...
Hacktivists Hack Israeli Nuclear Facility
The hacktivist group ‘Anonymous’ has claimed a recent breach of Israel’s nuclear facility networks in Dimona as a protest against the war with Gaza....
Microsoft’s New AI Hacker Tracker
Microsoft set to release Copilot for Security AI tool to help cybersecurity workers produce summaries of suspicious incidents and identify hackers’ methods to conceal...
ChatGPT Plugins Vulnerable to Threat Actors
Software company Salt Labs reveals that ChatGPT plugins that let it interact with external programs and services have vulnerabilities that could be exploited during...
French Government Hit with Severe Cyberattacks
Several government departments in France fell victim to multiple cyberattacks of "unprecedented intensity,” and hacktivist group Anonymous Sudan is claiming responsibility.
The French Prime Minister’s...
North Korean Hackers Steal South Korean Funds And Secrets
North Korean hackers have stolen vital microchip information from South Korean chip makers, according to reports from South Korea’s National Intelligence Service (NIS).
“We believe...
New Approach Revolutionizes Quantum Computer Cybersecurity
Quantum computers can solve complex problems exponentially faster than classical computers and are hailed as the future of computing; however, they are still vulnerable...
New Malicious “AI Worm” Threatens Generative AI Tools
Many companies are integrating generative AI tools into their products to reduce the human workload and make hard tasks easier, which is both transformative...
No Search Warrant, No IP Address
Canada’s Supreme Court rules that the Canadian police won’t be able to access an IP address without a search warrant.
This case was brought to...
Lightning Never Strikes Twice? Ransomware Attackers Seen Regularly Repeating Previous Attacks
Cybersecurity company Cybereason reveals that the actual price of a ransomware attack on a business includes much more than the ransom itself.
When choosing whether...
China is Boosting its Cyber Defenses in Fear of Cyberattacks and...
China reportedly intends to improve the data security of its industrial sector in order to effectively contain any “major risks,” a process that is...
The Rise of Romance Crypto-Scamming
Malicious romance cybercriminal steals close to a quarter million dollars from a victim in a months-long online scam.
This type of online scam is also...
New Type of Cyberattack Uses Wireless Charger to Set Your Smartphone...
Security experts from the University of Florida worked with CertiK and found a certain class of cyberattacks that could cause a smartphone to catch...
The Growing Need for Satellite Cybersecurity
The expansion of the digital realm into space has opened new frontiers for cyber threats, posing unprecedented challenges.
The satellites orbiting Earth are crucial for...
WiFi Vulnerability Threatens Android Users
Hackers can now create clones of WiFi hotspots and intercept data, as well as enable unauthorized access to protected home Wi-Fi networks and expose...
Hackers Can Use the Sound of Swiping to Steal Your Fingerprints
Nowadays, fingerprints are one of the most popular forms of personal identification, whether it’s unlocking your phone, approving online payments, access control, and many...
Several Countries Join Forces to Smash the World’s Most Dangerous Cybergang
UK and US law enforcement led an international operation, successfully disrupting the Russian-linked ransomware specialist LockBit, one of the most harmful cybercrime groups in...
Criminals Break into Smart Homes by Jamming Wireless Security
A series of robberies in Minneapolis led police to believe that burglars are using WiFi jammers to block off security system signals from reaching...