APT28 Targets Diplomats with HeadLace Malware via Car Sale Phishing Lure
Sensitive Illinois Voter Data Exposed by Contractor’s Unsecured Databases
Social Media Firms Fail to Protect Children’s Privacy, Says UK ICO
Krebs: U.S. Trades Cybercriminals to Russia in Prisoner Swap
Who Ya’ Gonna Call? Why IoT Companies Should Embrace Vulnerability Disclosure Programs
Why the Market’s Most-Regulated Companies Need Military-Grade Cybersecurity
U.S. Expected to Propose Barring Chinese Software in Autonomous Vehicles
Five Chinese Nationals Arrested by Feds for ‘Massive’ Elder Fraud Scheme
Cryptonator Seized for Laundering Ransom Payments, Stolen Crypto
DuckDuckGo Blocked in Indonesia Over Porn, Gambling Search Results | Israeli Hacktivist Group ‘WeRedEvils’ Brags It Took Down Iran’s Internet
‘StormBamboo’ Hackers Breach ISP to Poison Software Updates With Malware
Hackers Directly Email Customers of Immigration Firm After Damaging Cyberattack
Fake AI Editor Ads on Facebook Push Password-Stealing Malware
Surge in Magniber Ransomware Attacks Impact Home Users Worldwide
Hackers Exploit Misconfigured Jupyter Notebooks with Repurposed Minecraft DDoS Tool
Mirai Botnet targeting OFBiz Servers Vulnerable to Directory Traversal
New Windows Backdoor BITSLOTH Exploits BITS for Stealthy Communication
Linux Kernel Impacted by New Slubstick Cross-Cache Attack
Legendary Rom Hacking Site RomHacking.net Shutting Down After Almost 20 Years |