The Employees’ Provident Fund Organization (EPFO), responsible for managing deductions from the salaries of employees, has issued a warning to its 6.5 crore members concerning the escalating threat of cybercrime. EPFO has observed a notable increase in fraudulent activities…
Category: EN
Hackers Breach Steam Discord Accounts, Launch Malware
On Christmas Day, the popular indie strategy game Slay the Spire’s fan expansion, Downfall, was compromised, allowing Epsilon information stealer malware to be distributed over the Steam update system. Developer Michael Mayhem revealed that the corrupted package is not a…
School student info proving valuable to hackers
Hackers have recently intensified their efforts to pilfer digital information pertaining to students, encompassing a wide array of sensitive data such as health records, attendance information, homework, grades, medical details, photos, disciplinary records, educational records, home communication information, assignments, and…
US Senators Targeted by Swatting Incidents in Multiple States
A recent surge of “swatting” incidents across America, primarily targeting Republican politicians, has perplexed police agencies and put victims in risk this holiday season, driving lawmakers to demand for stricter anti-swatting laws and harsher penalties. Swatting entails filing a…
New Variant of DLL Search Order Hijacking Bypasses Windows 10 and 11 Protections
Security researchers have detailed a new variant of a dynamic link library (DLL) search order hijacking technique that could be used by threat actors to bypass security mechanisms and achieve execution of malicious code on systems running Microsoft Windows 10…
Year In Review: Google’s Corporate Paternalism in The Browser
< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> It’s a big year for the oozing creep of corporate paternalism and ad-tracking technology online. Google and its subsidiary companies have tightened their grips on the throat…
Digital Rights for LGBTQ+ People: 2023 Year in Review
< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> An increase in anti-LGBTQ+ intolerance is impacting individuals and communities both online and offline across the globe. Throughout 2023, several countries sought to pass explicitly anti-LGBTQ+ initiatives…
Cactus RANSOMWARE gang hit the Swedish retail and grocery provider Coop
The Cactus ransomware group claims to have hacked Coop, one of the largest retail and grocery providers in Sweden. Coop is one of the largest retail and grocery providers in Sweden, with approximately 800 stores across the country. The stores…
Trading Tomorrow’s Technology for Today’s Privacy: The AI Conundrum in 2024
Artificial Intelligence (AI) is a technology that continually absorbs and transfers humanity’s collective intelligence with machine learning algorithms. It is a technology that is all-pervasive, and it will soon be all-pervasive as well. It is becoming increasingly clear that,…
New Terrapin Attack Demonstrates SSH Vulnerabilities
Researchers have devised a new attack strategy, called “Terrapin,” that exploits vulnerabilities in the SSH… New Terrapin Attack Demonstrates SSH Vulnerabilities on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses. This article has been indexed…
Microsoft Deprecates Application Guard For Edge For Business Users
After serving users for several years, Microsoft Application Guard bids farewell as the tech giant… Microsoft Deprecates Application Guard For Edge For Business Users on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses. This article…
Xamalicious Android Malware Targeted Users Via Google Play Store Apps
Heads up, Android users! Double-check your devices for possible Xamalicious infection, as the malware has… Xamalicious Android Malware Targeted Users Via Google Play Store Apps on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses. This…
Monitoring malware trends with VT Intelligence
Please note that this blogpost is part of our #VTMondays series, check out our collection of past publications here. VT Intelligence can be a powerful tool for monitoring malware trends, enhancing your detection capabilities and enabling proactive defense against evolving…
8 Essential Steps to Recover a Hacked Website
When you find out your website is hacked, it’s understandable that you’d begin to panic. But it’s much better to plan and take action immediately to get back to your website as soon as possible. In this article, we’ll cover…
Insights from CISA HPH Sector Risk and Vulnerability Assessment
In an ever-evolving digital landscape, the healthcare and public health (HPH) sector faces increasing cybersecurity challenges. The United States Cybersecurity and Infrastructure Security Agency (CISA) recently conducted a Risk and Vulnerability Assessment (RVA), delving into the cybersecurity posture of an…
Happy New Year 2024
<img alt=”” height=”776″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/4d6aae25-176c-4cd8-9458-23bc0e77adc3/Blowing%2Bhorns%2Bon%2BBleeker%2BStreet%2Bon%2BNew%2BYear%27s%2BDay%2BPhotographer%2BMarjory%2BCollins%2BJanuary%2B1943%2BNew%2BYork.jpg?format=1000w” width=”736″ /><figcaption class=”image-caption-wrapper”> via Photographer Marjory Collins in New York City, NY, USA, January 1943, Blowing Horns on Bleeker Street, New Year’s Day The post Happy New Year 2024 appeared first on Security Boulevard. This article…
4 key devsecops skills for the generative AI era
When cloud computing became enterprise-ready, and tools such as continuous integration and continuous delivery, infrastructure as code, and Kubernetes became mainstream, it marked a clear paradigm shift in dev and ops. The work separating dev and ops became devops responsibilities,…
The Three Keys to Success in Cybersecurity
In this episode, host Tom Eston shares the three key lessons he’s learned over his 18-year career in cybersecurity: effective communication, continuous learning, and empathy. He talks about the importance of understanding and reaching both technical and non-technical audiences, the…
New Terrapin Flaw Could Let Attackers Downgrade SSH Protocol Security
Security researchers from Ruhr University Bochum have discovered a vulnerability in the Secure Shell (SSH) cryptographic network protocol that could allow an attacker to downgrade the connection’s security by breaking the integrity of the secure channel. Called Terrapin (CVE-2023-48795, CVSS score: 5.9),…
A Closer Look At The Future of MagSafe in Apple’s Ecosystem
Apple is actively exploring ways to enhance MagSafe, aiming to enable wireless data transfer and seamless recognition and authentication of connected accessories. Currently, placing a MagSafe-compatible iPhone on a MagSafe charger allows for charging, even with an added MagSafe iPhone…