News

Indonesia has achieved a new milestone in restoring 86 public services following the Temporary National Data Center cyberattack. The cyberattack affected operations across 16 state institutions, ...
The Fake GRISELDA website and mobile application (Source: CERT-UA) Meanwhile, the Eyes system, a tool used for military tracking, became another target. Hackers modified its legitimate software, ...
IntelBroker, a shadowy figure in the cybersecurity world, has gained notoriety for a string of high-profile cyberattacks and subsequent data leaks targeting a diverse range of organizations, spanning ...
The cybersecurity community is on edge after an unidentified threat actor operating under the username ‘UAE’, claimed responsibility for a massive data breach attack involving the United Arab Emirates ...
As estimates of the quantum computing power needed to crack current public key encryption algorithms continue to drop, a group of technology companies and organizations is urging users to begin ...
Popular open-source enterprise Resource Planning (ERP) system, Apache OFBiz, recently discovered harboring a critical Remote Code Execution (RCE) vulnerability. Tracked as CVE-2024-45195, the Apache ...
A new Microsoft Windows feature dubbed Recall planned for Copilot+ PCs has been called a security and privacy nightmare by cybersecurity researchers and privacy advocates. Copilot Recall will be ...
Source: Infection Chain (Cyble) FatalRAT, renowned as a Remote Access Trojan, grants attackers control over victim systems, facilitating the theft of sensitive information. This campaign’s strategic ...
From there, the book dives into fundamental cybersecurity concepts, providing readers with the knowledge they need to identify, protect against, detect, and respond to cyber threats effectively.
CocoaPods vulnerabilities reported today could allow malicious actors to take over thousands of unclaimed pods and insert malicious code into many of the most popular iOS and MacOS applications, ...
The hacking group Dark Storm Team has issued a menacing ultimatum, vowing to unleash a wave of cyberattacks targeting the services and government websites of NATO countries, Israel, and those nations ...
A massive data breach originating from a private industry contractor of the Chinese Ministry of Public Security (MPS), known as iSoon (also referred to as Anxun), has surfaced on GitHub. The Ministry ...