Cyber

Crypto scammers posing as real brands on X are easily hacking YouTubers

Fighting game YouTuber now fighting Google over “monstrous” post-hack revenue loss. Credit: via Capcom USA For months, popular fighting game YouTubers have been under attack. Even the seemingly most cautious among them...

Critical WordPress plugin vulnerability under active exploit threatens thousands

Vulnerability with severity rating of 9.8 out of possible 10 still live on >8,000...

5 charged in “Scattered Spider,” one of the most profitable phishing scams ever

Phishing attacks were so well-orchestrated that they fooled some of the best in the...

Hundreds of code libraries posted to NPM try to install malware on dev machines

These are not the the developer tools you think they are. Credit: Getty Images An ongoing...

Android Trojan that intercepts voice calls to banks just got more stealthy

FakeCall malware can reroute calls intended for banks to attacker-controlled numbers. Credit: Getty Images Researchers have...

SEC sues SolarWinds over massive cyberattack, alleging fraud and weak controls

SolarWinds Corp banner hangs at the New York Stock Exchange (NYSE) on the IPO day of the company in New York, U.S., October 19,...

Splunk to cut 7% of workforce, or about 500 employees, ahead of Cisco acquisition

The Splunk logo is displayed on a phone screen on top of a laptop keyboard in this photo taken in Krakow, Poland, on Oct....

Okta cybersecurity breach wipes out more than $2 billion in market cap

The Okta website on a laptop arranged in Dobbs Ferry, New York, on Feb. 28, 2021. Tiffany Hagler-Geard | Bloomberg | Getty Images Okta has shed more...

Xos’s medium-duty electric truck hits the road with Penske

In Penske Truck Leasing’s latest electrification move, it’s added Xos’s medium-duty electric trucks to its fleet. Penske has adopted the Xos Stepvan, a battery-electric Class 6...

Why Unity felt the need to “rush out” its controversial install-fee program

New report details internal divisions, intense push for mobile ad money. 96WITH FURTHER READING Unity makes major changes to controversial install-fee programIt's been over a month now...

Social media is drowning in misinformation on the Israel-Hamas conflict

Nobody is unbiased, all sides participate in some sort of propaganda, and social media is filled with misinformation, Dr. Roberto Mazza warns. No slickly...

Google Chrome mimicked to spread malware

Bogus browser updates that mimic notifications from Google Chrome, Mozilla Firefox, and Microsoft Edge are being increasingly used by criminals to install malware on...

Okta says hackers breached its support system and viewed customer files

Hackers obtained valid credentials, but Okta doesn't say how. 20WITH Identity and authentication management provider Okta said hackers managed to view private customer information after gaining...

Facebook copyright scam intensifies, users left stranded

The Facebook copyright infringement scam appears to have intensified, with users reporting being locked out of their accounts with little help from the Meta-owned...

Telegram, AWS users targeted by hidden malware code

Telegram, AWS, and Alibaba Cloud users are being targeted by a fresh malware campaign that strategically buries malicious code within specific software functions to...

YouTube is cracking down on adblock users: pay or disable

YouTube has introduced an anti-adblock feature, which alerts users with pop-ups and interrupts the viewing experience. The adblocking community is already working on ways...

Cloud gaming firm Shadow says hackers stole customers’ personal data

Image Credits: Shadow French technology company Shadow has confirmed a data breach involving customers’ personal information. The Paris-headquartered startup, which offers gaming through its cloud-based PC service, said...

Lakera launches to protect large language models from malicious prompts

With $10M in backing, Swiss startup launches API to protect companies from prompt injections and more Image Credits: Supatman / Getty Images Large language models (LLMs) are the driving...

Vulnerabilities in Supermicro BMCs could allow for unkillable server rootkits

With the ability to manage huge fleets of servers, BMCs are ideal places to stash malware. 66WITH If your organization uses servers that are equipped with...
HomeCyber