Computer Security

CVE-2022-42475 Vulnerability: How to Stay Protected screenshot

CVE-2022-42475 Vulnerability: How to Stay Protected

In the ever-evolving cybersecurity landscape, staying informed about vulnerabilities and their potential impacts is crucial. One such vulnerability that has garnered significant attention is CVE-2022-42475. Here, we... Read more

June 12, 2024
Millions of Cox Modems Succumb to Remote Hacking via Vulnerabilities screenshot

Millions of Cox Modems Succumb to Remote Hacking via Vulnerabilities

Cox Communications, a major telecommunications company, recently addressed a series of vulnerabilities that could have allowed remote hackers to take control of millions of customer modems. These vulnerabilities were... Read more

June 4, 2024
31-Year-Old Sentenced to 10 Years for Laundering Email Scams Amounting to $4.5 Million screenshot

31-Year-Old Sentenced to 10 Years for Laundering Email Scams Amounting to $4.5 Million

The U.S. Department of Justice (DoJ) has handed down a 10-year prison sentence to Malachi Mullings, a 31-year-old resident of Sandy Springs, Georgia. Mullings pleaded guilty to laundering over $4.5 million acquired... Read more

May 29, 2024
Durian Malware Linked to Kimsuky North Korean Threat Actor screenshot

Durian Malware Linked to Kimsuky North Korean Threat Actor

The North Korean threat group known as Kimsuky has been observed using a new Golang-based malware called Durian in targeted cyber attacks against two South Korean cryptocurrency companies. According to security... Read more

May 13, 2024
Wpeeper Mobile Malware Targets Android Devices screenshot

Wpeeper Mobile Malware Targets Android Devices

Researchers in cybersecurity have identified new malware that targets Android devices. This malware, named Wpeeper, was found to use compromised WordPress websites to mask its true command-and-control servers, making... Read more

May 8, 2024
Muddling Meerkat APT Discovered Pulling DNS Tricks screenshot

Muddling Meerkat APT Discovered Pulling DNS Tricks

A new cyber threat named Muddling Meerkat has been detected engaging in sophisticated activities involving the domain name system (DNS) since October 2019. This appears to be an attempt to evade security measures and... Read more

April 30, 2024
Large-Scale Credential Theft Campaign Targets Snowflake Cloud Storage screenshot

Large-Scale Credential Theft Campaign Targets Snowflake Cloud Storage

A new report from Mandiant has revealed that approximately 165 organizations have been affected by a large-scale campaign exploiting stolen customer credentials to target Snowflake cloud storage systems. The campaign... Read more

June 11, 2024
European Union Agency for Cybersecurity: Disruptive Cyberattacks Doubled in 2024, Most Linked to Russian-Backed Groups screenshot

European Union Agency for Cybersecurity: Disruptive Cyberattacks Doubled in 2024, Most Linked to Russian-Backed Groups

Disruptive cyberattacks have surged in the European Union, with many linked to Russian-backed groups, according to the European Union Agency for Cybersecurity (ENISA). Juhan Lepassaar, head of ENISA, highlighted in an... Read more

May 30, 2024
Understanding EU ATM Malware: A Growing Cyber Threat screenshot

Understanding EU ATM Malware: A Growing Cyber Threat

What is EU ATM Malware? EU ATM malware represents a sophisticated and evolving category of malicious software designed to target Automated Teller Machines (ATMs) in Europe. These malicious programs enable... Read more

May 28, 2024
CVE-2024-3661 Vulnerability Exploited in TunnelVision Attack screenshot

CVE-2024-3661 Vulnerability Exploited in TunnelVision Attack

Researchers have described a technique called TunnelVision, which allows threat actors to monitor network traffic of victims by leveraging the same local network. This bypass method, referred to as "decloaking," has... Read more

May 10, 2024
Cuckoo Stealer Takes Aim at Mac Systems screenshot

Cuckoo Stealer Takes Aim at Mac Systems

Security researchers have detected a fresh information thief aimed at Apple macOS systems, designed to establish persistence on affected machines and operate as spyware. Known as Cuckoo by Kandji, this malware is a... Read more

May 7, 2024
Kaolin RAT Linked to North Korean Lazarus Group APT screenshot

Kaolin RAT Linked to North Korean Lazarus Group APT

The Lazarus Group, associated with North Korea, utilized familiar tactics involving fake job offers to distribute a new remote access trojan (RAT) called Kaolin RAT during attacks aimed at specific individuals in Asia... Read more

April 29, 2024
Ticketmaster’s Snowflake Platform Data Breach Impacts Millions screenshot

Ticketmaster’s Snowflake Platform Data Breach Impacts Millions

Ticketmaster, along with several other organizations, experienced a significant data breach due to a security incident at the cloud storage company Snowflake. This breach came to light when a well-known hacking group... Read more

June 5, 2024
The Potential Issues with EMP.dll File: What You Need to Know screenshot

The Potential Issues with EMP.dll File: What You Need to Know

Understanding DLL Files Dynamic Link Library (DLL) files are essential components of the Windows operating system. They contain code and data that a lot of programs can use at the same time. These files help programs... Read more

May 30, 2024
The 2024 US Election: Navigating the New Frontier of Potential AI-Driven Cyber Threats screenshot

The 2024 US Election: Navigating the New Frontier of Potential AI-Driven Cyber Threats

As the 2024 US presidential election approaches, the potential for cyber threats looms larger than ever. The rise of artificial intelligence (AI) has added a new dimension to the cybersecurity landscape, posing... Read more

May 20, 2024
ROOTROT Malware Used by Chinese Threat Actor screenshot

ROOTROT Malware Used by Chinese Threat Actor

The MITRE Corporation has provided additional information about a recent cyber attack, revealing that the earliest signs of intrusion date back to December 31, 2023. This attack, disclosed last month, targeted MITRE's... Read more

May 9, 2024
Google Reports Blocking Over 2.2 Million Malicious Apps on the Play Store screenshot

Google Reports Blocking Over 2.2 Million Malicious Apps on the Play Store

In late April 2024, Google announced that enhancements to its security processes prevented 2.28 million privacy-violating apps from being published on its Google Play store in 2023. The company attributed this success... Read more

April 30, 2024
Akira Ransomware Banks $42 Million in Ransom Payments Over a Single Year screenshot

Akira Ransomware Banks $42 Million in Ransom Payments Over a Single Year

Since early 2023, Akira ransomware has targeted more than 250 victims globally and collected over $42 million in ransom payments, according to CISA, the FBI, Europol, and the Netherlands’ National Cyber Security... Read more

April 26, 2024
Loading...