A recent study by Infoblox has unveiled the existence of a vast “criminal affiliate program” involving renowned cybercriminal groups ClearFake, SocGholish, and dozens of others, with VexTrio acting as the primary partner. VexTrio is...
The British government has called upon leaders of major corporations to “strengthen” their defenses against cyberattacks, treating this threat as a critical business risk on par with financial and legal challenges. This appeal followed...
ReversingLabs has identified two malicious modules in the widely-used NPM package registry, which utilize GitHub to store SSH keys encrypted in Base64 that had previously been pilfered from developers’ systems. The modules, named warbeast2000...
Security researchers hacked a Tesla car modem and received a total reward of $722,500 on the first day of the Pwn2Own Automotive 2024 competition, currently taking place in Tokyo. Today, white-hat hackers discovered no...
MSI has announced the launch of the AXE5400 WiFi USB wireless adapter. Through a USB interface, this device enables older desktops and laptops to effortlessly connect to 6 GHz networks, offering a plug-and-play installation...
In the realm of cybersecurity, a new threat is gaining momentum: adaptive phishing campaigns. This method represents an evolution of traditional phishing, where perpetrators adopt a personalized approach to circumvent defenses, leveraging information about...
The Shadowserver Service is documenting attempts to exploit the critical vulnerability CVE-2023-22527, which enables remote code execution on outdated versions of Atlassian Confluence servers. Atlassian disclosed the issue last week, noting that it affects...
Security mobile application company Oversecured has recently disclosed a vulnerability found in several popular Java and Android application libraries, rendering them susceptible to a new supply chain attack method named MavenGate. Oversecured’s analysis highlights...
Cybernews specialists, led by cybersecurity researcher Bob Diachenko, have identified a colossal data leak dubbed the “Mother of all Breaches” (MOAB), encompassing 12 TB of information and over 26 billion records. This unprecedented volume,...
In December 2023, media organizations and prominent North Korean affairs experts became the targets of a new malicious campaign orchestrated by the hacker group ScarCruft. Researchers at SentinelOne reported that the group is experimenting...
According to a blog post penned by Google’s Vice President Parisa Tabriz, as reported by Wccftech, the Chrome browser is set to undergo enhancements based on artificial intelligence capabilities. The forthcoming version aims to...
At the outset of this month’s CES 2024, LG unveiled its MyView series of smart monitors, featuring the models 32SR85U, 32SR83U, and 32SR70U. These models are distinguished by their 31.5-inch IPS panels and a...
Trezor, a developer of hardware wallets for cryptocurrency, has reported a data breach. The attack occurred on January 17, 2024, when malefactors gained unauthorized access to a third-party technical support portal. While the investigation...
Cybersecurity researchers from Jamf Threat Labs have analyzed over 10,000 scripts utilized by the Parrot Traffic Direction System (TDS) and unearthed significant advancements in the optimization of these scripts. These enhancements render the malicious...
Before the U.S. Securities and Exchange Commission’s (SEC) official announcement of the approval of a Bitcoin ETF, hackers hijacked the SEC’s official X/Twitter account and disseminated information regarding the ETF’s approval. Subsequently, the price...
Trellix, a cybersecurity firm, has unveiled a new sophisticated Java-based tool for information theft, employing a Discord bot to pilfer confidential data from compromised hosts. Named NS-STEALER, the malware disseminates via ZIP archives, masquerading...