Cyber

Commercial spyware vendor exploits used by Kremlin-backed hackers, Google says

Findings undercut pledges of NSO Group and Intellexa their wares won't be abused. Critics of spyware and exploit sellers have long warned that the advanced hacking sold by commercial surveillance...

Unpatchable 0-day in surveillance cam is being exploited to install Mirai

Vulnerability is easy to exploit and allows attackers to remotely execute commands. Malicious hackers are...

Microsoft to host security summit after CrowdStrike disaster

Redmond wants to improve the resilience of Windows to buggy software. Microsoft is stepping up...

Android malware steals payment card data using previously unseen technique

Attacker then emulates the card and makes withdrawals or payments from victim's account. Newly discovered...

Hackers exploit VMware vulnerability that gives them hypervisor admin

Create new group called "ESX Admins" and ESXi automatically gives it admin rights. Microsoft is...

Facebook copyright scam intensifies, users left stranded

The Facebook copyright infringement scam appears to have intensified, with users reporting being locked out of their accounts with little help from the Meta-owned...

Telegram, AWS users targeted by hidden malware code

Telegram, AWS, and Alibaba Cloud users are being targeted by a fresh malware campaign that strategically buries malicious code within specific software functions to...

YouTube is cracking down on adblock users: pay or disable

YouTube has introduced an anti-adblock feature, which alerts users with pop-ups and interrupts the viewing experience. The adblocking community is already working on ways...

Cloud gaming firm Shadow says hackers stole customers’ personal data

Image Credits: Shadow French technology company Shadow has confirmed a data breach involving customers’ personal information. The Paris-headquartered startup, which offers gaming through its cloud-based PC service, said...

Lakera launches to protect large language models from malicious prompts

With $10M in backing, Swiss startup launches API to protect companies from prompt injections and more Image Credits: Supatman / Getty Images Large language models (LLMs) are the driving...

Vulnerabilities in Supermicro BMCs could allow for unkillable server rootkits

With the ability to manage huge fleets of servers, BMCs are ideal places to stash malware. 66WITH If your organization uses servers that are equipped with...

Cybersecurity teams understaffed – report

A cybersecurity skills gap is leaving businesses vulnerable to attacks, a new study from ISACA warns. Businesses are experiencing more cyberattacks and recognize an increased...

European Standards Organization ETSI gets hacked, user data stolen

The European Telecommunications Standards Institute (ETSI) faced a cyberattack that allowed hackers to exfiltrate a database containing a list of online users, the organization...

MGM and Caesars-like phishing campaign continues targeting luxury hotels

Luxury hotels remain the major target of a “well-crafted and innovative” social engineering campaign, cybersecurity experts warn. The hospitality industry is still “very at risk”...

Facebook live streaming fakes used as lure by phishers

The World Sailing Championships were recently spoofed by scammers on Facebook, who used fake offers of free live streaming to fool the unwary into...

US State Dept emails stolen by Chinese hackers in Microsoft leak, staffer says

Microsoft's email platform breach allowed Chinese hackers to steal tens of thousands of emails from US State Department accounts, a Senate staffer told Reuters. The...

What is Origin Server? How To Protect them? A Detailed Guide

The origin server stores a website’s or application’s content and data. As the starting point for all requests made to a website, the origin server’s...

Bitcoin meets Tesla’s green target for resuming payments

Elon Musk will now be tested on his earlier pledge to resume accepting Bitcoin (BTC) payments at Tesla once the digital currency’s mining reaches...

Sony Launches Investigation After Ransomware Group Claims to Have Breached Company’s Systems

Sony has said it has launched an investigation after a ransomware group claimed to have breached the company’s systems. Cyber Security Connect reported that a ransomware...
HomeCyber