8/2-4/2024

APT28 Targets Diplomats with HeadLace Malware via Car Sale Phishing Lure

Sensitive Illinois Voter Data Exposed by Contractor’s Unsecured Databases

Social Media Firms Fail to Protect Children’s Privacy, Says UK ICO

Krebs: U.S. Trades Cybercriminals to Russia in Prisoner Swap

Who Ya’ Gonna Call? Why IoT Companies Should Embrace Vulnerability Disclosure Programs

Why the Market’s Most-Regulated Companies Need Military-Grade Cybersecurity

U.S. Expected to Propose Barring Chinese Software in Autonomous Vehicles

Five Chinese Nationals Arrested by Feds for ‘Massive’ Elder Fraud Scheme

Cryptonator Seized for Laundering Ransom Payments, Stolen Crypto

DuckDuckGo Blocked in Indonesia Over Porn, Gambling Search Results
Israeli Hacktivist Group ‘WeRedEvils’ Brags It Took Down Iran’s Internet

‘StormBamboo’ Hackers Breach ISP to Poison Software Updates With Malware

Hackers Directly Email Customers of Immigration Firm After Damaging Cyberattack

Fake AI Editor Ads on Facebook Push Password-Stealing Malware

Surge in Magniber Ransomware Attacks Impact Home Users Worldwide

Hackers Exploit Misconfigured Jupyter Notebooks with Repurposed Minecraft DDoS Tool

Mirai Botnet targeting OFBiz Servers Vulnerable to Directory Traversal

New Windows Backdoor BITSLOTH Exploits BITS for Stealthy Communication

Linux Kernel Impacted by New Slubstick Cross-Cache Attack

Legendary Rom Hacking Site RomHacking.net Shutting Down After Almost 20 Years

Leave a Reply