Tag: EN

Hackers Exploit Hikvision Camera Flaw to Steal Sensitive Data

Security researchers have observed renewed exploit campaigns targeting an eight-year-old backdoor in Hikvision cameras to harvest configuration files, user lists, and snapshots. Attackers automate scans across IP ranges, appending a base64-encoded “auth” parameter to management URLs. When decoded, the string…

LNK Malware Leverages Legit Windows Files to Slip Past Defenses

In a recently observed campaign emerging from Israel, threat actors have revived the use of Windows shortcut (.LNK) files to deliver a potent Remote Access Trojan (RAT). These seemingly innocuous shortcut files exploit Living-off-the-Land Binaries (LOLBins) such as odbcconf.exe to…

Man Arrested In Probe Of Cyber-Attack On Airports

National Crime Agency arrests and releases man in forties from West Sussex after ransomware attack disrupts flights across Europe This article has been indexed from Silicon UK Read the original article: Man Arrested In Probe Of Cyber-Attack On Airports

Chinese Hackers Breach U.S. Firms as Trade Tensions Rise

A Coordinated Breach Comes to Light CNN reported that Chinese state-linked hackers infiltrated several U.S. legal and technology firms in a campaign that stretched for months, if not longer. According to U.S. officials, the attackers gained unauthorized access to internal…

$439 million recovered in global financial crime crackdown

Authorities around the world have recovered $439 million from criminals following a months-long operation led by INTERPOL. The effort, called HAECHI VI, ran from April through August 2025 and involved police in 40 countries and territories working together to track…

New framework sets baseline for SaaS security controls

Managing security across dozens or even hundreds of SaaS apps has become a major headache. Each tool has its own settings, permissions, and logs, and most third-party risk processes only look at the vendor’s overall security, not the app itself.…

The fight to lock down drones and their supply chains

Drones have already shown their impact in military operations, and their influence is spreading across the agricultural and industrial sectors. Given their technological capabilities, we need to be aware of the risks they bring. Drones as a new attack vector…