Technology New Windows zero-day exploited by 11 state hacking groups since 2017 Mar 18, 2025 bleepingcomputer.com At least 11 state-backed hacking groups from North Korea, Iran, Russia, and China have been exploiting a new Windows vulnerability…
Cyber Security A Switch (Back) To On-Prem Solutions to Maximize Control & Security Mar 9, 2025 cyberdefensemagazine.com As organizations reassess their data security strategies at year end, many are considering moving from cloud services to on-prem solutions…
Technology Police arrests suspects tied to AI-generated CSAM distribution ring Feb 28, 2025 bleepingcomputer.com Law enforcement agencies from 19 countries have arrested 25 suspects linked to a criminal ring that was distributing child sexual…
Technology New Auto-Color Linux backdoor targets North American govts, universities Feb 25, 2025 bleepingcomputer.com A previously undocumented Linux backdoor dubbed 'Auto-Color' was observed in attacks between November and December 2024, targeting universities and government…
Cyber Security How Phished Data Turns into Apple & Google Wallets Feb 18, 2025 krebsonsecurity.com Carding -- the underground business of stealing, selling and swiping stolen payment card data -- has long been the dominion…
Cyber Security Warning: Tunnel of Love Leads to Scams Feb 14, 2025 darkreading.com Romance-baiting losses were up 40% last year, as more and more pig-butchering efforts crop up in the wild.
Cyber Security Microsoft: Russia’s Sandworm APT Exploits Edge Bugs Globally Feb 12, 2025 darkreading.com Sandworm (aka Seashell Blizzard) has an initial access wing called "BadPilot" that uses standard intrusion tactics to spread Russia's tendrils…
Technology Crypto-stealing apps found in Apple App Store for the first time Feb 4, 2025 bleepingcomputer.com A new campaign dubbed 'SparkCat' has been uncovered, targeting the cryptocurrency wallet recovery phrases of Android and iOS users using…
Technology Cloudflare mitigated a record-breaking 5.6 Tbps DDoS attack Jan 21, 2025 bleepingcomputer.com The largest distributed denial-of-service (DDoS) attack to date peaked at 5.6 terabits per second and came from a Mirai-based botnet with…
Cyber Security Phishing Attacks Are the Most Common Smartphone Security Issue for Consumers Jan 20, 2025 darkreading.com New hands-on testing results show that most devices are unable to catch phishing emails, texts, or calls, leaving users at…
New Windows zero-day exploited by 11 state hacking groups since 2017
At least 11 state-backed hacking groups from North Korea, Iran, Russia, and China have been exploiting a new Windows vulnerability…
A Switch (Back) To On-Prem Solutions to Maximize Control & Security
As organizations reassess their data security strategies at year end, many are considering moving from cloud services to on-prem solutions…
Police arrests suspects tied to AI-generated CSAM distribution ring
Law enforcement agencies from 19 countries have arrested 25 suspects linked to a criminal ring that was distributing child sexual…
New Auto-Color Linux backdoor targets North American govts, universities
A previously undocumented Linux backdoor dubbed 'Auto-Color' was observed in attacks between November and December 2024, targeting universities and government…
How Phished Data Turns into Apple & Google Wallets
Carding -- the underground business of stealing, selling and swiping stolen payment card data -- has long been the dominion…
Warning: Tunnel of Love Leads to Scams
Romance-baiting losses were up 40% last year, as more and more pig-butchering efforts crop up in the wild.
Microsoft: Russia’s Sandworm APT Exploits Edge Bugs Globally
Sandworm (aka Seashell Blizzard) has an initial access wing called "BadPilot" that uses standard intrusion tactics to spread Russia's tendrils…
Crypto-stealing apps found in Apple App Store for the first time
A new campaign dubbed 'SparkCat' has been uncovered, targeting the cryptocurrency wallet recovery phrases of Android and iOS users using…
Cloudflare mitigated a record-breaking 5.6 Tbps DDoS attack
The largest distributed denial-of-service (DDoS) attack to date peaked at 5.6 terabits per second and came from a Mirai-based botnet with…
Phishing Attacks Are the Most Common Smartphone Security Issue for Consumers
New hands-on testing results show that most devices are unable to catch phishing emails, texts, or calls, leaving users at…