Microsoft’s apps for MacOS have been exploited by hackers recently to expose a critical vulnerability. It is believed that hackers have been exploiting vulnerabilities in popular applications, such as Microsoft Outlook and Teams, to spy on Mac users. In…
Category: EN
Cybercriminals Place 85-Year-Old Woman Under ‘Digital Arrest’ in Hyderabad, Cheat Her of ₹5.9 Crore
Cybercriminals recently targeted an 85-year-old woman from the city, subjecting her to what can be described as a ‘digital arrest’ and extorting a staggering ₹5.9 crore from her. This elaborate scam involved convincing the elderly woman that her Aadhaar…
Oil Giant Halliburton Hit by Cyberattack, Certain Systems Affected
On Friday, oil firm Halliburton revealed further details to regulators regarding a recent attack that forced the shutdown of critical systems. The company told news outlets that it was struck by a cyberattack on Wednesday, which disrupted operations at…
Cyble Research Reveals Near-Daily Surge in Supply Chain Attacks
The prevalence of software supply chain attacks is on the rise, posing significant threats due to the extensive impact and severity of such incidents, according to threat intelligence researchers at Cyble. Within a six-month span from February to mid-August,…
Unicoin’s Four-Day Cyberattack: Disruption, Recovery, and Ongoing Investigation
Unicoin, a leading cryptocurrency company, experienced a cyberattack beginning on August 9, 2024, which severely disrupted its operations for nearly four days. The breach occurred when a hacker gained unauthorised access to the company’s Google G-Suite account, affecting all…
The Limitations of Traditional Network-Based Vulnerability Scanning – And the Systematic Underestimation of Software Risks
Introduction Recent NetRise research found that vulnerability risks are, on average, 200 times greater than what traditional network-based vulnerability scanners report! For years, traditional network-based vulnerability scanning has been a cornerstone of cybersecurity efforts for enterprise organizations. These scanners have…
Cybersecurity Strategy: Understanding the Benefits of Continuous Threat Exposure Management
The cybersecurity industry is littered with buzzwords, technologies and acronyms that can often be overwhelming for security professionals doing their best to keep up and ensure their organizations are being adequately protected. Naturally, it’s the leading analyst, research and consulting…
Data Security Posture Management (DSPM) is an Important First Step in Deploying Gen AI and Copilot Tools
Microsoft’s advanced AI assistant, Copilot, has gained significant traction in corporate environments and is rapidly changing how users interact with data across Microsoft 365 applications. Although Copilot introduces countless new possibilities, it has also brought challenges related to data access…
Massive Data Breach Worsens as New Details Emerge Across US, UK, and Canada
Several days ago, the company whose data breach could have potentially exposed all Americans’ Social Security numbers to identity thieves confirmed that they were victims of a data breach, stressing that they obtained even more sensitive data than previously…
Protecting Your Wallet: Understanding NGate Android Malware
A new and sophisticated malware has emerged, targeting the increasingly popular Near Field Communication (NFC) payment systems. Known as NGate, this Android malware has been discovered by ESET Research and poses a significant risk to users’ financial security. This blog…
Iranian Threat Actor TA453 Targets Jewish Figure with Fake Podcast Invite in Malicious Campaign
A recent cyber campaign by the Iranian threat actor TA453 has drawn significant attention following their targeting of a prominent Jewish religious figure with a fake podcast interview invitation. The campaign, which began in July 2024, involved a series…
Strategizing Compliance and Security In AI: A Hands-On Guide for IT Leaders
Navigating the complex web of compliance in the AI era is a formidable challenge, and aligning your organization with existing and emerging legal, ethical, and regulatory standards has never been… The post Strategizing Compliance and Security In AI: A Hands-On…
Qilin Ransomware Upgrades and Now Steals Google Chrome Credentials
Qilin ransomware is evolving, now targeting Google Chrome credentials. Learn how this new tactic expands their attack arsenal… This article has been indexed from Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News Read the original article: Qilin Ransomware Upgrades…
The US Navy Has Run Out of Pants
Plus: The US intelligence community formally blames Iran for Trump campaign hack, aircraft-tracking platform FlightAware says a “configuration error” exposed sensitive user data, and more. This article has been indexed from Security Latest Read the original article: The US Navy…
NSA Issues Guidance for Better Logging, Threat Detection to Prevent LotL Incidents
The NSA has released guidelines to improve logging and threat detection for Living-off-the-Land (LotL) attacks in cloud services, enterprise networks, mobile devices, and OT networks as part of a global effort for critical infrastructure security. This article has been indexed…
CISA Adds Dahua IP Camera, Linux Kernel, and Microsoft Exchange Server Bugs to its KEV Catalog
The CISA has added new vulnerabilities to its Known Exploited Vulnerabilities catalog, including Dahua IP Camera authentication bypass flaws, a Linux Kernel buffer overflow issue, and a Microsoft Exchange Server vulnerability. This article has been indexed from Cyware News –…
Greasy Opal’s CAPTCHA Solver Still Serving Cybercrime After 16 Years
Greasy Opal, a well-known developer, has been aiding cybercriminals for 16 years by offering a tool that can solve CAPTCHAs automatically on a large scale, bypassing security measures. This article has been indexed from Cyware News – Latest Cyber News…
August 2024 Web Server Survey
In the August 2024 survey we received responses from 1,107,785,375 sites across 270,065,795 domains and 13,011,016 web-facing computers. This reflects an increase of 3.6 million sites, a loss of 364,061 domains, and an increase of 119,600 web-facing computers. Cloudflare experienced…
Slack Patches AI Bug That Exposed Private Channels
Slack fixed a vulnerability in its AI feature that could allow attackers to steal data from private channels. The flaw involved a prompt injection flaw in an AI feature, which allowed attackers to manipulate the system to perform malicious actions.…
Urgent Edge Security Update: Microsoft Patches Zero-day & RCE Vulnerabilities
The urgent security update, Microsoft Edge Stable Channel Version 128.0.2739.42, based on Chromium versions 128.0.6613.85 and 128.0.6613.84, addresses a total of 25 security issues. This article has been indexed from Cyware News – Latest Cyber News Read the original article:…