Cyber

Backdoor infecting VPNs used “magic packets” for stealth and security

J-Magic backdoor infected organizations in a wide array of industries. Credit: Getty Images When threat actors use backdoor malware to gain access to a network, they want to make sure all their...

Ongoing attacks on Ivanti VPNs install a ton of sneaky, well-written malware

In-the-wild attacks tamper with built-in security tool to suppress infection warnings. Credit: Getty Images Networks protected...

Time to check if you ran any of these 33 malicious Chrome extensions

Two separate campaigns have been stealing credentials and browsing history for months. Credit: Getty Images As...

Passkey technology is elegant, but it’s most definitely not usable security

Just in time for holiday tech-support sessions, here's what to know about passkeys. Credit: Getty...

Crypto scammers posing as real brands on X are easily hacking YouTubers

Fighting game YouTuber now fighting Google over “monstrous” post-hack revenue loss. Credit: via Capcom USA For months,...

Microsoft: English-speaking ransom gang issuing death threats

Microsoft has detected a threat actor linked to the gang that recently launched high-profile cyberattacks on casinos in Las Vegas. In rare cases, the...

Critical vCenter Server vulnerability reported, VMware releases a fix

The leading virtualization and cloud tech provider VMware has disclosed a critical vulnerability with a score of 9.8 out of 10, affecting its vCenter...

Discord file links will expire after a day to fight malware

The company says anyone using Discord to host files should consider a different service. Anyone using Discord to host files will want to change that,...

The Global Cybersecurity Forum 2023

The Digital Watch Observatory will provide just-in-time reporting from the GCF, leveraging our AI-driven App. Visit our dedicated page for all the latest insights...

SEC sues SolarWinds over massive cyberattack, alleging fraud and weak controls

SolarWinds Corp banner hangs at the New York Stock Exchange (NYSE) on the IPO day of the company in New York, U.S., October 19,...

Splunk to cut 7% of workforce, or about 500 employees, ahead of Cisco acquisition

The Splunk logo is displayed on a phone screen on top of a laptop keyboard in this photo taken in Krakow, Poland, on Oct....

Okta cybersecurity breach wipes out more than $2 billion in market cap

The Okta website on a laptop arranged in Dobbs Ferry, New York, on Feb. 28, 2021. Tiffany Hagler-Geard | Bloomberg | Getty Images Okta has shed more...

Xos’s medium-duty electric truck hits the road with Penske

In Penske Truck Leasing’s latest electrification move, it’s added Xos’s medium-duty electric trucks to its fleet. Penske has adopted the Xos Stepvan, a battery-electric Class 6...

Why Unity felt the need to “rush out” its controversial install-fee program

New report details internal divisions, intense push for mobile ad money. 96WITH FURTHER READING Unity makes major changes to controversial install-fee programIt's been over a month now...

Social media is drowning in misinformation on the Israel-Hamas conflict

Nobody is unbiased, all sides participate in some sort of propaganda, and social media is filled with misinformation, Dr. Roberto Mazza warns. No slickly...

Google Chrome mimicked to spread malware

Bogus browser updates that mimic notifications from Google Chrome, Mozilla Firefox, and Microsoft Edge are being increasingly used by criminals to install malware on...

Okta says hackers breached its support system and viewed customer files

Hackers obtained valid credentials, but Okta doesn't say how. 20WITH Identity and authentication management provider Okta said hackers managed to view private customer information after gaining...

Facebook copyright scam intensifies, users left stranded

The Facebook copyright infringement scam appears to have intensified, with users reporting being locked out of their accounts with little help from the Meta-owned...

Telegram, AWS users targeted by hidden malware code

Telegram, AWS, and Alibaba Cloud users are being targeted by a fresh malware campaign that strategically buries malicious code within specific software functions to...
HomeCyber