Cyber

Ongoing attacks on Ivanti VPNs install a ton of sneaky, well-written malware

In-the-wild attacks tamper with built-in security tool to suppress infection warnings. Credit: Getty Images Networks protected by Ivanti VPNs are under active attack by well-resourced hackers who are exploiting a critical...

Time to check if you ran any of these 33 malicious Chrome extensions

Two separate campaigns have been stealing credentials and browsing history for months. Credit: Getty Images As...

Passkey technology is elegant, but it’s most definitely not usable security

Just in time for holiday tech-support sessions, here's what to know about passkeys. Credit: Getty...

Crypto scammers posing as real brands on X are easily hacking YouTubers

Fighting game YouTuber now fighting Google over “monstrous” post-hack revenue loss. Credit: via Capcom USA For months,...

Critical WordPress plugin vulnerability under active exploit threatens thousands

Vulnerability with severity rating of 9.8 out of possible 10 still live on >8,000...

Researcher uncovers one of the biggest password breaches in recent history

Roughly 25 million of the passwords have never been seen before by widely used service. Nearly 71 million unique credentials stolen for logging into websites...

Critical Xwiki vulnerability risks RCE attacks

Xwiki, an application development platform, has a critical vulnerability that could open it up for remote code execution (RCE) attacks. Xwiki is vulnerable to remote...

Toronto Zoo hit by ransomware attack

The largest zoo in Canada, Toronto Zoo, was hit by a ransomware attack on Friday, January 5th, affecting systems and some information about visitors,...

Saudi Ministry exposed sensitive data for 15 months

Saudi Arabia’s Ministry of Industry and Mineral Resources (MIM) had an environment file exposed, opening up sensitive details for anybody willing to take them....

Dark web sees “surge” of X gold accounts on sale

There’s a “gold rush” on the dark web as threat actors target verified accounts on X, formerly Twitter, for large-scale attacks, cybersecurity experts at...

Accounts in danger: Google recommends enhanced safe browsing and extra care

After reports of a new malware strain stealing and maintaining Google sessions, the tech giant is encouraging users to enable enhanced safe browsing and...

Passkeys: What They Are and Why You Need Them ASAP

We tell you what passkeys are, how you can get them, and where you can use them to log in securely without exposing your...

Apple And Cyber Startup Corellium Settle Four-Year Court Battle

After four years of court hearings and plenty of controversy, Apple and cyber startup Corellium are settling a copyright lawsuit. Terms have not been...

U.S, U.K. And 16 Other Nations Agree On AI Security Guidelines

Eighteen countries have signed an agreement on AI safety, based on the principle that it should be secure by design. The Guidelines for Secure AI System...

Google agrees to settle Chrome incognito

2020 lawsuit accused Google of tracking incognito activity, tying it to users' profiles. Google has indicated that it is ready to settle a class-action lawsuit filed in...

Big Tech’s divisive ‘personalization’ attracts fresh call for profiling-based content feeds to be off by default in EU

Image Credits: Jake O'Limb / PhotoMosh / Getty Images Another policy tug-of-war could be emerging around Big Tech’s content recommender systems in the European Union where the Commission...

CircleCI warns customers to rotate ‘any and all secrets’ after hack

Image Credits: Boris Zhitkov (opens in a new window)/ Getty Images CircleCI, a company whose development products are popular with software engineers, has urged users to rotate their...

Apple releases security updates for iOS, iPadOS and macOS, fixing two actively exploited zero-days

Apple has released security updates for iPhones, iPads and Macs to patch against two vulnerabilities, which the company says are being actively exploited to...

Security flaws in court record systems used in five US states exposed sensitive legal documents

The vulnerabilities allowed public access to restricted, sealed and confidential court filings using only a web browser Image Credits: Bryce Durbin / TechCrunch Witness lists and testimony, mental health evaluations,...
HomeCyber