5/30/2024

FlyingYeti Exploits WinRAR Vulnerability to Deliver COOKBOX Malware in Ukraine

macOS Version of Elusive ‘LightSpy’ Spyware Tool Discovered

Healthcare Sector Maps Cyber Risk Posed by ‘Single Points of Failure’

Mystery Attacker Remotely Bricked 600,000 SOHO Routers With Malicious Firmware Update

U.S. Treasury Says NFTs ‘Highly Susceptible’ to Fraud, but Ignored by High-Tier Criminals

Krebs: ‘Operation Endgame’ Hits Malware Delivery Platforms

U.S. Dismantles World’s Largest 911 S5 Botnet with 19 Million Infected Devices

The Unusual Espionage Act Case Against a Drone Photographer

These Internet Browsers Promise Privacy. What Does That Actually Mean?
Cybercriminals Raid BBC Pension Database, Steal Records of Over 25,000 People

Patients’ Personal Information Possibly Exposed in Data Breach at UChicago Medicine

Everbridge Warns of Corporate Systems Breach Exposing Business Data

Cooler Master Confirms Customer Info Stolen in Data Breach

Cybercriminals Abuse Stack Overflow to Promote Malicious Python Package

Pirated Microsoft Office Delivers Malware Cocktail on Systems

RedTail Crypto-Mining Malware Exploiting Palo Alto Networks Firewall Vulnerability

Researchers Uncover Active Exploitation of WordPress Plugin Vulnerabilities

CISA Alerts Federal Agencies to Patch Actively Exploited Linux Kernel Flaw

Leave a Reply