Hackers compromised a popular courtroom recording platform used across jails and prisons around the globe, to gain full control of…
Security
The MITRE Corporation has revealed that the cyber attack targeting the not-for-profit company towards late December 2023 by exploiting zero-day…
An independent researcher claims that commercial grade spyware tool PCTattletale was found to leak live-screen recordings/screenshots to the internet, making…
Available as both an IDA plugin and a Python script, Nimfilt helps to reverse engineer binaries compiled with the Nim…
Australian telco Optus faces legal battle with the country’s communications and media watchdog over the 2022 data breach. The Optus…
Cybersecurity researchers have discovered that the malware known as BLOODALCHEMY used in attacks targeting government organizations in Southern and Southeastern Asia is in…
An unknown ransomware actor has compromised the personally identifiable data of more than 50,000 Californian school administrators, their association told…
Malicious actors have backdoored the installer associated with courtroom video recording software developed by Justice AV Solutions (JAVS) to deliver…
Google on Thursday rolled out fixes to address a high-severity security flaw in its Chrome browser that it said has…
Introduction The infamous Colonial pipeline ransomware attack (2021) and SolarWinds supply chain attack (2020) were more than data leaks; they were seismic shifts in…
Australian cyber chief announced Friday an “unwelcome development†in the recently disclosed MediSecure data breach. A hacker claimed to possess…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added a four-year-old security flaw affecting Apache Flink to its…
Don’t be fooled into thinking that cyber threats are only a problem for large organizations. The truth is that cybercriminals…
A new study reveals that Tesla’s keyless entry system in its latest Model 3 remains vulnerable to relay attacks despite…
As AI gets closer to the ability to cause physical harm and impact the real world, “it’s complicated†is no…
Cybersecurity defenders have widely relied on blocking attacker IP addresses through identified IOCs in response to threat actor campaigns. However,…
The China-linked threat actor known as Sharp Panda has expanded their targeting to include governmental organizations in Africa and the…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting Apache Flink, the open-source, unified stream-processing and batch-processing…
The British Government is proposing sweeping change in its approach to ransomware attacks, proposing mandatory reporting by victims and licensing…
Ransomware attacks targeting VMware ESXi infrastructure following an established pattern regardless of the file-encrypting malware deployed. “Virtualization platforms are a core component…