H  January(103)  February(113)  March(175)  APRIL(74)  MAY(28)  JUNE(198)  July(423)  August(462)  September(389)  October(406)  November(302)  December(361)

DATE

NAME

CATEGORY

WEB

31.12.23

Android game dev’s Google Drive misconfig highlights cloud security risksAndroid

BleepingComputer

31.12.23

New Black Basta decryptor exploits ransomware flaw to recover filesRansom

BleepingComputer

31.12.23

Beware: Scam-as-a-Service Aiding Cybercriminals in Crypto Wallet-Draining AttacksCryptocurrencyThe Hacker News

30.12.23

From DarkGate to AsyncRAT: Malware Detected and Shared As Unit 42 Timely Threat IntelligenceMalware blogPalo Alto

30.12.23

Dual Privilege Escalation Chain: Exploiting Monitoring and Service Mesh Configurations and Privileges in GKE to Gain Unauthorized Access in KubernetesExploit blogPalo Alto

30.12.23

A year in review: 10 of the biggest security incidents of 2023Incident blog

Eset

30.12.23

Got a new device? 7 things to do before disposing of your old techSecurity blog

Eset

30.12.23

The Week in Ransomware - December 29th 2023 - LockBit targets hospitalsRansom

BleepingComputer

30.12.23

Hospitals ask courts to force cloud storage firm to return stolen dataIncindent

BleepingComputer

30.12.23

Malware abuses Google OAuth endpoint to ‘revive’ cookies, hijack accountsVirus

BleepingComputer

30.12.23

Steam game mod breached to push password-stealing malwareVirus

BleepingComputer

29.12.23

Game mod on Steam breached to push password-stealing malwareVirus

BleepingComputer

29.12.23

Eagers Automotive halts trading in response to cyberattackAttack

BleepingComputer

29.12.23

EasyPark discloses data breach that may impact millions of usersIncindent

BleepingComputer

29.12.23

Microsoft disables MSIX protocol handler abused in malware attacksVirus

BleepingComputer

29.12.23

Kroll reveals FTX customer info exposed in August data breachIncindent

BleepingComputer

29.12.23

Russian military hackers target Ukraine with new MASEPIE malwareBigBrothers

BleepingComputer

29.12.23

Apache OFBiz RCE flaw exploited to find vulnerable Confluence serversExploit

BleepingComputer

29.12.23

Blockchain dev's wallet emptied in "job interview" using npm packageCryptocurrency

BleepingComputer

29.12.23

Ohio Lottery hit by cyberattack claimed by DragonForce ransomwareRansom

BleepingComputer

29.12.23

Lockbit ransomware disrupts emergency care at German hospitalsRansom

BleepingComputer

29.12.23

Albanian Parliament and One Albania Telecom Hit by Cyber AttacksBigBrothers

The Hacker News

29.12.23

CERT-UA Uncovers New Malware Wave Distributing OCEANMAP, MASEPIE, STEELHOOKVirusThe Hacker News

29.12.23

Kimsuky Hackers Deploying AppleSeed, Meterpreter, and TinyNuke in Latest AttacksAPTThe Hacker News

29.12.23

Microsoft Disables MSIX App Installer Protocol Widely Used in Malware AttacksVirusThe Hacker News

28.12.23

Google Cloud Resolves Privilege Escalation Flaw Impacting Kubernetes ServiceVulnerebilityThe Hacker News

28.12.23

Most Sophisticated iPhone Hack Ever Exploited Apple's Hidden Hardware FeatureAppleThe Hacker News

28.12.23

New Rugmi Malware Loader Surges with Hundreds of Daily DetectionsVirusThe Hacker News

28.12.23

Critical Zero-Day in Apache OfBiz ERP System Exposes Businesses to AttackVulnerebilityThe Hacker News

27.12.23

Mortgage firm LoanCare warns 1.3 million people of data breachIncindent

BleepingComputer

27.12.23

Panasonic discloses data breach after December 2022 cyberattackIncindent

BleepingComputer

27.12.23

New Xamalicious Android malware installed 330k times on Google PlayAndroid

BleepingComputer

27.12.23

iPhone Triangulation attack abused undocumented hardware featureApple

BleepingComputer

27.12.23

Barracuda fixes new ESG zero-day exploited by Chinese hackersVulnerebility

BleepingComputer

27.12.23

Yakult Australia confirms 'cyber incident' after 95 GB data leakIncindent

BleepingComputer

27.12.23

GitHub warns users to enable 2FA before upcoming deadlineSafety

BleepingComputer

27.12.23

Integris Health patients get extortion emails after cyberattackIncindent

BleepingComputer

27.12.23

GTA 5 source code reportedly leaked online a year after Rockstar hackIncindent

BleepingComputer

27.12.23

Google Chrome now scans for compromised passwords in the backgroundSafety

BleepingComputer

27.12.23

Chinese Hackers Exploited New Zero-Day in Barracuda's ESG AppliancesExploitThe Hacker News

27.12.23

New Sneaky Xamalicious Android Malware Hits Over 327,000 DevicesAndroidThe Hacker News

27.12.23

Warning: Poorly Secured Linux SSH Servers Under Attack for Cryptocurrency MiningCryptocurrencyThe Hacker News

26.12.23

Carbanak Banking Malware Resurfaces with New Ransomware TacticsVirusThe Hacker News

26.12.23

Cloud Atlas' Spear-Phishing Attacks Target Russian Agro and Research CompaniesPhishingThe Hacker News

25.12.23

Why Is an Australian Footballer Collecting My Passwords? The Various Ways Malicious JavaScript Can Steal Your SecretsMalware blogPalo Alto

25.12.23

THE RISING THREAT OF PHISHING ATTACKS WITH CRYPTO DRAINERSPhishing blogCheckpoint

25.12.23

Intellexa and Cytrox: From fixer-upper to Intel Agency-grade spywareMalware blog

Cisco Blog

25.12.23

Operation Blacksmith: Lazarus targets organizations worldwide using novel Telegram-based malware written in DLangBigBrother blog

Cisco Blog

25.12.23

Key findings from ESET Threat Report H2 2023 – Week in security with Tony AnscombeCyber blog

Eset

25.12.23

Safeguard the joy: 10 tips for securing your shiny new deviceSafety blog

Eset

25.12.23

These aren’t the Androids you should be looking forOS Blog

Eset

25.12.23

ESET Threat Report H2 2023Cyber blog

Eset

25.12.23

ESET Research Podcast: Neanderthals, Mammoths and TelekopyeCyber blog

Eset

24.12.23

‘Wall of Flippers’ detects Flipper Zero Bluetooth spam attacksSpam

BleepingComputer

24.12.23

Mint Mobile discloses new data breach exposing customer dataIncindent

BleepingComputer

24.12.23

The Week in Ransomware - December 22nd 2023 - BlackCat hackedRansom

BleepingComputer

24.12.23

Ubisoft says it's investigating reports of a new security breachIncindent

BleepingComputer

24.12.23

Nissan Australia cyberattack claimed by Akira ransomware gangRansom

BleepingComputer

24.12.23

Europol warns 443 online shops infected with credit card stealersCyberCrime

BleepingComputer

24.12.23

Fake VPN Chrome extensions force-installed 1.5 million timesHack

BleepingComputer

24.12.23

Crypto drainer steals $59 million from 63k people in Twitter ad pushCryptocurrency

BleepingComputer

24.12.23

Lapsus$ hacker behind GTA 6 leak gets indefinite hospital sentenceIncindent

BleepingComputer

24.12.23

Microsoft: Hackers target defense firms with new FalseFont malwareVirus

BleepingComputer

24.12.23

First American takes IT systems offline after cyberattackHack

BleepingComputer

24.12.23

Microsoft deprecates Defender Application Guard for some Edge usersSecurity

BleepingComputer

24.12.23

OpenAI rolls out imperfect fix for ChatGPT data leak flawAI

BleepingComputer

24.12.23

BidenCash darkweb market gives 1.9 million credit cards for freeCyberCrime

BleepingComputer

24.12.23

Android malware Chameleon disables Fingerprint Unlock to steal PINsAndroid

BleepingComputer

24.12.23

Fake F5 BIG-IP zero-day warning emails push data wipersVulnerebility

BleepingComputer

24.12.23

Google fixes 8th Chrome zero-day exploited in attacks this yearExploit

BleepingComputer

24.12.23

Crypto scammers abuse Twitter ‘feature’ to impersonate high-profile accountsCryptocurrency

BleepingComputer

24.12.23

New phishing attack steals your Instagram backup codes to bypass 2FAPhishing

BleepingComputer

24.12.23

Ivanti releases patches for 13 critical Avalanche RCE flawsVulnerebility

BleepingComputer

24.12.23

Microsoft fixes Wi-Fi issues triggered by recent Windows updatesOS

BleepingComputer

24.12.23

Healthcare software provider data breach impacts 2.7 millionIncindent

BleepingComputer

24.12.23

The password attacks of 2023: Lessons learned and next stepsSecurity

BleepingComputer

24.12.23

German police takes down Kingdom Market cybercrime marketplaceCyberCrime

BleepingComputer

24.12.23

New Web injections campaign steals banking data from 50,000 peopleHack

BleepingComputer

24.12.23

FBI: ALPHV ransomware raked in $300 million from over 1,000 victimsRansom

BleepingComputer

24.12.23

Interpol operation arrests 3,500 cybercriminals, seizes $300 millionCyberCrime

BleepingComputer

24.12.23

Microsoft confirms Windows 11 Wi-Fi issues, asks for user feedbackOS

BleepingComputer

24.12.23

How the FBI seized BlackCat (ALPHV) ransomware’s serversRansom

BleepingComputer

24.12.23

Terrapin attacks can downgrade security of OpenSSH connectionsAttack

BleepingComputer

24.12.23

FBI disrupts Blackcat ransomware operation, creates decryption toolRansom

BleepingComputer

24.12.23

British LAPSUS$ Teen Members Sentenced for High-Profile AttacksAttackThe Hacker News

23.12.23

Rogue WordPress Plugin Exposes E-Commerce Sites to Credit Card TheftCyberCrimeThe Hacker News

23.12.23

Operation RusticWeb: Rust-Based Malware Targets Indian Government EntitiesVirusThe Hacker News

23.12.23

Decoy Microsoft Word Documents Used to Deliver Nim-Based MalwareVirusThe Hacker News

23.12.23

UAC-0099 Using WinRAR Exploit to Target Ukrainian Firms with LONEPAGE MalwareVirusThe Hacker News

23.12.23

Microsoft Warns of New 'FalseFont' Backdoor Targeting the Defense SectorVirusThe Hacker News

23.12.23

Experts Detail Multi-Million Dollar Licensing Model of Predator SpywareVirusThe Hacker News

23.12.23

Chameleon Android Banking Trojan Variant Bypasses Biometric AuthenticationAndroidThe Hacker News

23.12.23

New JavaScript Malware Targeted 50,000+ Users at Dozens of Banks WorldwideVirusThe Hacker News

23.12.23

German Authorities Dismantle Dark Web Hub 'Kingdom Market' in Global OperationBigBrothersThe Hacker News

23.12.23

Hackers Exploiting MS Excel Vulnerability to Spread Agent Tesla MalwareExploitThe Hacker News

21.12.23

Urgent: New Chrome Zero-Day Vulnerability Exploited in the Wild - Update ASAPVulnerebilityThe Hacker News

21.12.23

Remote Encryption Attacks Surge: How One Vulnerable Device Can Spell DisasterAttackThe Hacker News

21.12.23

Alert: Chinese-Speaking Hackers Pose as UAE Authority in Latest Smishing WaveAPTThe Hacker News

21.12.23

3,500 Arrested in Global Operation HAECHI-IV Targeting Financial CriminalsCyberCrimeThe Hacker News

21.12.23

New Go-Based JaskaGO Malware Targeting Windows and macOS SystemsVirusThe Hacker News

21.12.23

FBI Takes Down BlackCat Ransomware, Releases Free Decryption ToolRansomThe Hacker News

19.12.23

Behind the Scenes of Matveev's Ransomware Empire: Tactics and TeamRansomThe Hacker News

19.12.23

Hackers Abusing GitHub to Evade Detection and Control Compromised HostsSecurityThe Hacker News

19.12.23

Iranian Hackers Using MuddyC2Go in Telecom Espionage Attacks Across AfricaBigBrothersThe Hacker News

19.12.23

New Malvertising Campaign Distributing PikaBot Disguised as Popular SoftwareBotNetThe Hacker News

19.12.23

Xfinity discloses data breach affecting over 35 million peopleIncindent

BleepingComputer

19.12.23

December's Windows 11 KB5033375 update breaks Wi-Fi connectivityOS

BleepingComputer

19.12.23

Microsoft discovers critical RCE flaw in Perforce Helix Core ServerVulnerebility

BleepingComputer

19.12.23

Vans and North Face owner VF Corp hit by ransomware attackRansom

BleepingComputer

19.12.23

Microsoft fixes Windows printer issues with new troubleshooterVulnerebility

BleepingComputer

19.12.23

FBI: Play ransomware breached 300 victims, including critical orgsRansom

BleepingComputer

19.12.23

Former IT manager pleads guilty to attacking high school networkHack

BleepingComputer

19.12.23

Mortgage giant Mr. Cooper data breach affects 14.7 million peopleIncindent

BleepingComputer

19.12.23

WordPress hosting service Kinsta targeted by Google phishing adsPhishing

BleepingComputer

19.12.23

Rhadamanthys Stealer malware evolves with more powerful featuresVirus

BleepingComputer

19.12.23

What to do when receiving unprompted MFA OTP codesSecurity

BleepingComputer

19.12.23

Qbot malware returns in campaign targeting hospitality industryVirus

BleepingComputer

19.12.23

8220 Gang Exploiting Oracle WebLogic Server Vulnerability to Spread MalwareVirusThe Hacker News

19.12.23

Double-Extortion Play Ransomware Strikes 300 Organizations WorldwideRansomThe Hacker News

19.12.23

Beware: Experts Reveal New Details on Zero-Click Outlook RCE ExploitsExploitThe Hacker News

19.12.23

Rhadamanthys Malware: Swiss Army Knife of Information Stealers EmergesVirusThe Hacker News

19.12.23

Four U.S. Nationals Charged in $80 Million Pig Butchering Crypto ScamCryptocurrencyThe Hacker News

19.12.23

QakBot Malware Resurfaces with New Tactics, Targeting the Hospitality IndustryVirusThe Hacker News

19.12.23

CISA Urges Manufacturers Eliminate Default Passwords to Thwart Cyber ThreatsBigBrothersThe Hacker News

17.12.23

MongoDB Suffers Security Breach, Exposing Customer DataIncindentThe Hacker News

17.12.23

MongoDB says customer data was exposed in a cyberattackIncindent

BleepingComputer

17.12.23

QNAP VioStor NVR vulnerability actively exploited by malware botnetExploit

BleepingComputer

17.12.23

Microsoft unveils new, more secure Windows Protected Print ModeSafety

BleepingComputer

16.12.23

RHADAMANTHYS V0.5.0 – A DEEP DIVE INTO THE STEALER’S COMPONENTSRansom blogCheckpoint

16.12.23

Toward Ending the Domain Wars: Early Detection of Malicious Stockpiled DomainsMalware blogPalo Alto

16.12.23

New iOS feature to thwart eavesdropping – Week in security with Tony AnscombeOS Blog

Eset

16.12.23

OilRig’s persistent attacks using cloud service-powered downloadersAPT blog

Eset

16.12.23

Delivering trust with DNS securitySecurity blog

Eset

16.12.23

A pernicious potpourri of Python packages in PyPICyber blog

Eset

16.12.23

Black Hat Europe 2023: Should we regulate AI?Cyber blog

Eset

16.12.23

Silent but deadly: The rise of zero-click attacksAttack blog

Eset

16.12.23

The Week in Ransomware - December 15th 2023 - Ransomware DramaRansom

BleepingComputer

16.12.23

Ex-Amazon engineer pleads guilty to hacking crypto exchangesCryptocurrency

BleepingComputer

16.12.23

CISA urges tech manufacturers to stop using default passwordsBigBrothers

BleepingComputer

16.12.23

3CX warns customers to disable SQL database integrationsSecurity

BleepingComputer

16.12.23

Ransomware gang behind threats to Fred Hutch cancer patientsRansom

BleepingComputer

16.12.23

Delta Dental of California data breach exposed info of 7 million peopleIncindent

BleepingComputer

16.12.23

Kraft Heinz investigates hack claims, says systems ‘operating normally’Incindent

BleepingComputer

16.12.23

New NKAbuse malware abuses NKN blockchain for stealthy commsVirus

BleepingComputer

16.12.23

Ubiquiti users report having access to others’ UniFi routers, camerasSecurity

BleepingComputer

16.12.23

US detains suspects behind $80 million 'pig butchering' schemeCyberCrime

BleepingComputer

16.12.23

Ten new Android banking trojans targeted 985 bank apps in 2023Android

BleepingComputer

16.12.23

Discord adds Security Key support for all users to enhance securitySecurity

BleepingComputer

16.12.23

U.S. nuclear research lab data breach impacts 45,000 peopleIncindent

BleepingComputer

16.12.23

Ledger dApp supply chain attack steals $600K from crypto walletsCryptocurrency

BleepingComputer

16.12.23

Microsoft disrupts cybercrime gang behind 750 million fraudulent accountsCyberCrimeBleepingComputer

16.12.23

China's MIIT Introduces Color-Coded Action Plan for Data Security IncidentsIncindentThe Hacker News

16.12.23

Microsoft Warns of Storm-0539: The Rising Threat Behind Holiday Gift Card FraudsCyberCrimeThe Hacker News

16.12.23

New KV-Botnet Targeting Cisco, DrayTek, and Fortinet Devices for Stealthy AttacksBotNetThe Hacker News

15.12.23

Crypto Hardware Wallet Ledger's Supply Chain Breach Results in $600,000 TheftCryptocurrencyThe Hacker News

15.12.23

New Security Vulnerabilities Uncovered in pfSense Firewall Software - Patch NowVulnerebilityThe Hacker News

15.12.23

Google's New Tracking Protection in Chrome Blocks Third-Party CookiesSafetyThe Hacker News

15.12.23

New NKAbuse Malware Exploits NKN Blockchain Tech for DDoS AttacksVirusThe Hacker News

15.12.23

116 Malware Packages Found on PyPI Repository Infecting Windows and Linux SystemsVirusThe Hacker News

14.12.23

Microsoft seizes domains used to sell fraudulent Outlook accountsHack

BleepingComputer

14.12.23

Stealthy KV-botnet hijacks SOHO routers and VPN devicesBotNet

BleepingComputer

14.12.23

BazarCall attacks abuse Google Forms to legitimize phishing emailsPhishing

BleepingComputer

14.12.23

French police arrests Russian suspect linked to Hive ransomwareRansom

BleepingComputer

14.12.23

LockBit ransomware now poaching BlackCat, NoEscape affiliatesRansom

BleepingComputer

14.12.23

CISA: Russian hackers target TeamCity servers since SeptemberBigBrothers

BleepingComputer

14.12.23

Hackers are exploiting critical Apache Struts flaw using public PoCExploit

BleepingComputer

14.12.23

New cybercrime market 'OLVX' gains popularity among hackersCyberCrime

BleepingComputer

14.12.23

Microsoft: OAuth apps used to automate BEC and cryptomining attacksCryptocurrency

BleepingComputer

14.12.23

Ukrainian military says it hacked Russia's federal tax agencyBigBrothers

BleepingComputer

14.12.23

Microsoft December 2023 Patch Tuesday fixes 34 flaws, 1 zero-dayOS

BleepingComputer

14.12.23

Windows 11 KB5033375 update released with upgraded Copilot AI-assistantOS

BleepingComputer

14.12.23

Windows 10 KB5033372 update released with Copilot for everyone, 20 changesOS

BleepingComputer

14.12.23

Sophos backports RCE fix after attacks on unsupported firewallsVulnerebility

BleepingComputer

14.12.23

Ukraine's largest mobile carrier Kyivstar down following cyberattackMobil

BleepingComputer

14.12.23

Cloud engineer gets 2 years for wiping ex-employer’s code reposIncindent

BleepingComputer

14.12.23

Over 1,450 pfSense servers exposed to RCE attacks via bug chainHack

BleepingComputer

14.12.23

50K WordPress sites exposed to RCE attacks by critical bug in backup pluginVulnerebility

BleepingComputer

14.12.23

Lazarus hackers drop new RAT malware using 2-year-old Log4j bugVirus

BleepingComputer

14.12.23

Counter-Strike 2 HTML injection bug exposes players’ IP addressesHack

BleepingComputer

14.12.23

Apple emergency updates fix recent zero-days on older iPhonesApple

BleepingComputer

14.12.23

Cold storage giant Americold discloses data breach after April malware attackIncindent

BleepingComputer

14.12.23

Toyota warns customers of data breach exposing personal, financial infoIncindent

BleepingComputer

14.12.23

Kelvin Security hacking group leader arrested in SpainCyberCrime

BleepingComputer

14.12.23

Over 30% of Log4J apps use a vulnerable version of the libraryVulnerebility

BleepingComputer

14.12.23

AutoSpill attack steals credentials from Android password managersAndroidBleepingComputer

14.12.23

New Pierogi++ Malware by Gaza Cyber Gang Targeting Palestinian EntitiesBigBrothersThe Hacker News

14.12.23

Iranian State-Sponsored OilRig Group Deploys 3 New Malware DownloadersBigBrothersThe Hacker News

14.12.23

Russian SVR-Linked APT29 Targets JetBrains TeamCity Servers in Ongoing AttacksAPTThe Hacker News

14.12.23

New Hacker Group 'GambleForce' Tageting APAC Firms Using SQL Injection AttacksHackThe Hacker News

14.12.23

Microsoft Takes Legal Action to Crack Down on Storm-1152's Cybercrime NetworkCyberCrimeThe Hacker News

14.12.23

BazaCall Phishing Scammers Now Leveraging Google Forms for DeceptionPhishingThe Hacker News

13.12.23

Google Using Clang Sanitizers to Protect Android Against Cellular Baseband VulnerabilitiesAndroidThe Hacker News

13.12.23

Microsoft Warns of Hackers Exploiting OAuth for Cryptocurrency Mining and PhishingExploitThe Hacker News

13.12.23

Major Cyber Attack Paralyzes Kyivstar - Ukraine's Largest Telecom OperatorBigBrothersThe Hacker News

13.12.23

Microsoft's Final 2023 Patch Tuesday: 33 Flaws Fixed, Including 4 CriticalVulnerebilityThe Hacker News

13.12.23

Unveiling the Cyber Threats to Healthcare: Beyond the MythsCyberThe Hacker News

13.12.23

Russian APT28 Hackers Targeting 13 Nations in Ongoing Cyber Espionage CampaignAPTThe Hacker News

12.12.23

New MrAnon Stealer Malware Targeting German Users via Booking-Themed ScamVirusThe Hacker News

12.12.23

Apple Releases Security Updates to Patch Critical iOS and macOS Security FlawsAppleThe Hacker News

12.12.23

New Critical RCE Vulnerability Discovered in Apache Struts 2 - Patch NowVulnerebilityThe Hacker News

11.12.23

Researchers Unmask Sandman APT's Hidden Link to China-Based KEYPLUG BackdoorAPTThe Hacker News

11.12.23

Lazarus Group Using Log4j Exploits to Deploy Remote Access TrojansAPTThe Hacker News

11.12.23

SpyLoan Scandal: 18 Malicious Loan Apps Defraud Millions of Android UsersAndroidThe Hacker News

11.12.23

New PoolParty Process Injection Techniques Outsmart Top EDR SolutionsHackThe Hacker News

10.12.23

CRYPTO DECEPTION UNVEILED: CHECK POINT RESEARCH REPORTS MANIPULATION OF POOL LIQUIDITY SKYROCKETS TOKEN PRICE BY 22,000%.Cryptocurrency blogCheckpoint

10.12.23

THE OBVIOUS, THE NORMAL, AND THE ADVANCED: A COMPREHENSIVE ANALYSIS OF OUTLOOK ATTACK VECTORSAttack blogCheckpoint

10.12.23

Fighting Ursa Aka APT28: Illuminating a Covert CampaignAPT blogPalo Alto

10.12.23

New Tool Set Found Used Against Organizations in the Middle East, Africa and the USBigBrother blogPalo Alto

10.12.23

Exploring a Critical Risk in Google Workspace's Domain-Wide Delegation FeatureExploit blogPalo Alto

10.12.23

The malware, attacker trends and more that shaped the threat landscape in 2023Malware blog

Cisco Blog

10.12.23

Project PowerUp – Helping to keep the lights on in Ukraine in the face of electronic warfareBigBrother blog

Cisco Blog

10.12.23

Surge in deceptive loan apps – Week in security with Tony AnscombeCyber blog

Eset

10.12.23

Black Hat Europe 2023: The past could return to haunt youCyber blog

Eset

10.12.23

To tap or not to tap: Are NFC payments safer?Safety blog

Eset

10.12.23

Navigating privacy: Should we put the brakes on car tracking?Security blog

Eset

10.12.23

Beware of predatory fin(tech): Loan sharks use Android apps to reach new depthsOS Blog

Eset

10.12.23

SLAM Attack: New Spectre-based Vulnerability Impacts Intel, AMD, and Arm CPUsAttackThe Hacker News

9.12.23

VoBERT: Unstable Log Sequence Anomaly Detection: Introducing Vocabulary-Free BERT

Security

Black Hat EU 2023

9.12.23

Unmasking APTs: An Automated Approach for Real-World Threat Attribution

APT

Black Hat EU 2023

9.12.23

Off The Record - Weaponizing DHCP DNS Dynamic Updates

Security

Black Hat EU 2023

9.12.23

One Million ASUS Routers Under Control: Exploiting ASUS DDNS to MITM Admin Credentials

Hacking

Black Hat EU 2023

9.12.23

Kidnapping Without Hostages: Virtual Kidnapping and the Dark Road Ahead

AI

Black Hat EU 2023

9.12.23

Hacking Your Documentation: Who Should WTFM?

Hacking

Black Hat EU 2023

9.12.23

How We Taught ChatGPT-4 to Break mbedTLS AES With Side-Channel Attacks

AI

Black Hat EU 2023

9.12.23

A Security RISC? The State of Microarchitectural Attacks on RISC-V

Attack

Black Hat EU 2023

9.12.23

Old Code Dies Hard: Finding New Vulnerabilities in Old Third-Party Software Components and the Importance of Having SBoM for IoT/OT Devices

Vulnerebility

Black Hat EU 2023

9.12.23

Illegitimate Data Protection Requests - To Delete or to Address?

Security

Black Hat EU 2023

9.12.23

How I Learned to Stop Worrying and Build a Modern Detection & Response Program

Security

Black Hat EU 2023

9.12.23

Reviving JIT Vulnerabilities: Unleashing the Power of Maglev Compiler Bugs on Chrome Browser

Exploit

Black Hat EU 2023

9.12.23

Deleting Your Domain? Preventing Data Leaks at TLD Scale

Hacking

Black Hat EU 2023

9.12.23

Breaching the Perimeter via Cloud Synchronized Browser Settings  PAPER

Security

Black Hat EU 2023

9.12.23

When The Front Door Becomes a Backdoor: The Security Paradox of OSDP

Virus

Black Hat EU 2023

9.12.23

The Pool Party You Will Never Forget: New Process Injection Techniques Using Windows Thread Pools

Hacking

Black Hat EU 2023

9.12.23

Security Through Transparency: Scaling Your Customer Trust Program

Security

Black Hat EU 2023

9.12.23

Collide+Power: The Evolution of Software-based Power Side-Channels Attacks

Attack

Black Hat EU 2023

9.12.23

TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers

Hacking

Black Hat EU 2023

9.12.23

Through the Looking Glass: How Open Source Projects See Vulnerability Disclosure

Vulnerebility

Black Hat EU 2023

9.12.23

Indirect Prompt Injection Into LLMs Using Images and Sounds

Hacking

Black Hat EU 2023

9.12.23

Breaking Theoretical Limits: The Gap Between Virtual NICs and Physical Network Cards

Hacking

Black Hat EU 2023

9.12.23

REDIScovering HeadCrab - A Technical Analysis of a Novel Malware and the Mind Behind It

Malware

Black Hat EU 2023

9.12.23

A Decade After Stuxnet: How Siemens S7 is Still an Attacker's Heaven

IoT

Black Hat EU 2023

9.12.23

TunnelCrack: Leaking VPN Traffic by Manipulating Routing Tables

Hacking

Black Hat EU 2023

9.12.23

The Magnetic Pull of Mutable Protection: Worked Examples in Cryptographic Agility

Cryptography

Black Hat EU 2023

9.12.23

AutoSpill: Zero Effort Credential Stealing from Mobile Password Managers

Mobil

Black Hat EU 2023

9.12.23

Millions of Patient Records at Risk: The Perils of Legacy Protocols

IoT

Black Hat EU 2023

9.12.23

LogoFAIL: Security Implications of Image Parsing During System Boot

Hardware

Black Hat EU 2023

9.12.23

HODOR: Reducing Attack Surface on Node.js via System Call Limitation

Hacking

Black Hat EU 2023

9.12.23

Evils in the Sparse Texture Memory: Exploit Kernel Based on Undefined Behaviors of Graphic APIs

Exploit

Black Hat EU 2023

9.12.23

Norton Healthcare discloses data breach after May ransomware attackRansom

BleepingComputer

9.12.23

ALPHV ransomware site outage rumored to be caused by law enforcementRansom

BleepingComputer

9.12.23

Privilege elevation exploits used in over 50% of insider attacksExploit

BleepingComputer

9.12.23

Amazon sues REKK fraud gang that stole millions in illicit refundsIncindent

BleepingComputer

9.12.23

New 5Ghoul attack impacts 5G phones with Qualcomm, MediaTek chipsAttackBleepingComputer

9.12.23

Researchers Unveal GuLoader Malware's Latest Anti-Analysis TechniquesVirusThe Hacker News

9.12.23

New 5G Modem Flaws Affect iOS Devices and Android Models from Major BrandsAppleThe Hacker News

9.12.23

N. Korea's Kimsuky Targeting South Korean Research Institutes with Backdoor AttacksVirus

The Hacker News

9.12.23

Ransomware-as-a-Service: The Growing Threat You Can't IgnoreRansom

The Hacker News

9.12.23

Mac Users Beware: New Trojan-Proxy Malware Spreading via Pirated SoftwareApple

The Hacker News

9.12.23

WordPress Releases Update 6.4.2 to Address Critical Remote Attack VulnerabilityVulnerebility

The Hacker News

8.12.23

Russian military hackers target NATO fast reaction corpsBigBrothers

BleepingComputer

8.12.23

23andMe updates user agreement to prevent data breach lawsuitsIncindent

BleepingComputer

8.12.23

WordPress fixes POP chain exposing websites to RCE attacksVulnerebility

BleepingComputer

8.12.23

Russian pleads guilty to running crypto-exchange used by ransomware gangsCryptocurrency

BleepingComputer

8.12.23

UK and allies expose Russian FSB hacking group, sanction membersBigBrothers

BleepingComputer

8.12.23

Meta rolls out default end-to-end encryption on Messenger, FacebookSocial

BleepingComputer

8.12.23

Krasue RAT malware hides on Linux servers using embedded rootkitsVirus

BleepingComputer

8.12.23

New SLAM attack steals sensitive data from AMD, future Intel CPUsAttack

BleepingComputer

8.12.23

US senator: Govts spy on Apple, Google users via mobile notificationsBigBrothers

BleepingComputer

8.12.23

Navy contractor Austal USA confirms cyberattack after data leakIncindent

BleepingComputer

8.12.23

Atlassian patches critical RCE flaws across multiple productsVulnerebility

BleepingComputer

8.12.23

Nissan is investigating cyberattack and potential data breachIncindent

BleepingComputer

8.12.23

"Sierra:21" vulnerabilities impact critical infrastructure routersVulnerebility

BleepingComputer

8.12.23

HTC Global Services confirms cyberattack after data leaked onlineIncindent

BleepingComputer

8.12.23

Multiple NFT collections at risk by flaw in open-source libraryCryptocurrency

BleepingComputer

8.12.23

Kali Linux 2023.4 released with GNOME 45 and 15 new toolsOS

BleepingComputer

8.12.23

Microsoft to let Windows 10 home users buy Extended Security UpdatesOS

BleepingComputer

8.12.23

Hackers breach US govt agencies using Adobe ColdFusion exploitExploit

BleepingComputer

8.12.23

Holiday Hackers: How to Safeguard Your Service DeskHack

BleepingComputer

8.12.23

SpyLoan Android malware on Google Play downloaded 12 million timesAndroid

BleepingComputer

8.12.23

Windows 11 KB5032288 update improves Copilot, fixes 11 bugsOS

BleepingComputer

8.12.23

Microsoft fixes Outlook Desktop crashes when sending emailsOS

BleepingComputer

8.12.23

Stealthier version of P2Pinfect malware targets MIPS devicesVirus

BleepingComputer

8.12.23

Russian hackers exploiting Outlook bug to hijack Exchange accountsExploit

BleepingComputer

8.12.23

December Android updates fix critical zero-click RCE flawAndroid

BleepingComputer

8.12.23

Tipalti investigates claims of data stolen in ransomware attackRansom

BleepingComputer

8.12.23

Fake WordPress security advisory pushes backdoor pluginVirus

BleepingComputer

8.12.23

New AeroBlade hackers target aerospace sector in the U.S.BigBrothers

BleepingComputer

8.12.23

Founder of Bitzlato Cryptocurrency Exchange Pleads Guilty in Money-Laundering SchemeCryptocurrencyThe Hacker News

8.12.23

Microsoft Warns of COLDRIVER's Evolving Evasion and Credential-Stealing TacticsHackThe Hacker News

8.12.23

New Bluetooth Flaw Let Hackers Take Over Android, Linux, macOS, and iOS DevicesOS

The Hacker News

8.12.23

Hacking the Human Mind: Exploiting Vulnerabilities in the 'First Line of Cyber Defense'Exploit

The Hacker News

8.12.23

Governments May Spy on You by Requesting Push Notifications from Apple and GooglePhishing

The Hacker News

7.12.23

New Stealthy 'Krasue' Linux Trojan Targeting Telecom Firms in ThailandVirusThe Hacker News

7.12.23

Meta Launches Default End-to-End Encryption for Chats and Calls on MessengerSocialThe Hacker News

7.12.23

Alert: Threat Actors Can Leverage AWS STS to Infiltrate Cloud AccountsHack

The Hacker News

7.12.23

Sierra:21 - Flaws in Sierra Wireless Routers Expose Critical Sectors to Cyber AttacksVulnerebility

The Hacker News

7.12.23

Hackers Exploited ColdFusion Vulnerability to Breach Federal Agency ServersIncindent

The Hacker News

7.12.23

Atlassian Releases Critical Software Fixes to Prevent Remote Code ExecutionVulnerebilityThe Hacker News

6.12.23

Qualcomm Releases Details on Chip Vulnerabilities Exploited in Targeted AttacksVulnerebilityThe Hacker News

6.12.23

Warning for iPhone Users: Experts Warn of Sneaky Fake Lockdown Mode AttackApple

The Hacker News

6.12.23

Russia's AI-Powered Disinformation Operation Targeting Ukraine, U.S., and GermanyBigBrothers

The Hacker News

6.12.23

15,000 Go Module Repositories on GitHub Vulnerable to Repojacking AttackAttack

The Hacker News

5.12.23

New Threat Actor 'AeroBlade' Emerges in Espionage Attack on U.S. AerospaceBigBrothersThe Hacker News

5.12.23

Microsoft Warns of Kremlin-Backed APT28 Exploiting Critical Outlook VulnerabilityAPT

The Hacker News

5.12.23

New BLUFFS Bluetooth Attack Expose Devices to Adversary-in-the-Middle AttacksAttack

The Hacker News

5.12.23

New P2PInfect Botnet MIPS Variant Targeting Routers and IoT DevicesBotNet

The Hacker News

4.12.23

LogoFAIL: UEFI Vulnerabilities Expose Devices to Stealth Malware AttacksAttack

The Hacker News

4.12.23

Microsoft Warns of Malvertising Scheme Spreading CACTUS RansomwareRansom

The Hacker News

4.12.23

Linux version of Qilin ransomware focuses on VMware ESXiRansom

BleepingComputer

4.12.23

North Korea's state hackers stole $3 billion in crypto since 2017Cryptocurrency

BleepingComputer

4.12.23

New proxy malware targets Mac users through pirated softwareVirus

BleepingComputer

4.12.23

Over 20,000 vulnerable Microsoft Exchange servers exposed to attacksVulnerebility

BleepingComputer

4.12.23

Google Chrome's new cache change could boost performanceSecurity

BleepingComputer

4.12.23

US Health Dept urges hospitals to patch critical Citrix Bleed bugVulnerebility

BleepingComputer

2.12.23

New Tool Set Found Used Against Organizations in the Middle East, Africa and the US

BigBrother blogPalo Alto

2.12.23

Exploring a Critical Risk in Google Workspace's Domain-Wide Delegation Feature

Security blogPalo Alto

2.12.23

New SugarGh0st RAT targets Uzbekistan government and South Korea

Malware blog

Cisco Blog

2.12.23

What is threat hunting?

Security blog

Cisco Blog

2.12.23

Vulnerabilities in Adobe Acrobat, Microsoft Excel could lead to arbitrary code execution

Vulnerebility blog

Cisco Blog

2.12.23

Teaching appropriate use of AI tech – Week in security with Tony Anscombe

Cyber blog

Eset

2.12.23

Executives behaving badly: 5 ways to manage the executive cyberthreat

Cyber blog

Eset

2.12.23

Very precisely lost – GPS jamming

Hacking blog

Eset

2.12.23

Retail at risk: Top threats facing retailers this holiday season

Security blog

Eset

2.12.23

‘Tis the season to be wary: 12 steps to ruin a cybercriminal's day

Cyber blog

Eset

2.12.23

Agent Racoon Backdoor Targets Organizations in Middle East, Africa, and U.S.Virus

The Hacker News

2.12.23

Russian Hacker Vladimir Dunaev Convicted for Creating TrickBot MalwareVirus

The Hacker News

2.12.23

The Week in Ransomware - December 1st 2023 - Police hits affiliatesRansom

BleepingComputer

2.12.23

TrickBot malware dev pleads guilty, faces 35 years in prisonVirus

BleepingComputer

2.12.23

Hackers use new Agent Raccoon malware to backdoor US targetsVirus

BleepingComputer

2.12.23

French government recommends against using foreign chat appsBigBrothers

BleepingComputer

2.12.23

VMware fixes critical Cloud Director auth bypass unpatched for 2 weeksVulnerebility

BleepingComputer

2.12.23

Windows 10 KB5032278 update adds Copilot AI assistant, fixes 13 bugsOS

BleepingComputer

2.12.23

LogoFAIL attack can install UEFI bootkits through bootup logosAttack

BleepingComputer

2.12.23

US govt sanctions North Korea’s Kimsuky hacking groupBigBrothers

BleepingComputer

2.12.23

WhatsApp's new Secret Code feature hides your locked chatsSocial

BleepingComputer

2.12.23

Apple fixes two new iOS zero-days in emergency updatesApple

BleepingComputer

2.12.23

Capital Health Hospitals hit by cyberattack causing IT outagesIncindent

BleepingComputer

2.12.23

Cactus ransomware exploiting Qlik Sense flaws to breach networksRansom

BleepingComputer

2.12.23

Staples confirms cyberattack behind service outages, delivery issuesHack

BleepingComputer

2.12.23

Zyxel warns of multiple critical vulnerabilities in NAS devicesVulnerebility

BleepingComputer

2.12.23

FjordPhantom Android malware uses virtualization to evade detectionAndroid

BleepingComputer

2.12.23

Dollar Tree hit by third-party data breach impacting 2 million peopleIncindent

BleepingComputer

2.12.23

SIM swapper gets 8 years in prison for account hacks, crypto theftHack

BleepingComputer

2.12.23

Microsoft starts testing new Windows 11 Energy Saver featureOS

BleepingComputer

2.12.23

Black Basta ransomware made over $100 million from extortionRansom

BleepingComputer

2.12.23

Hackers breach US water facility via exposed Unitronics PLCsICS

BleepingComputer

2.12.23

Japanese Space Agency JAXA hacked in summer cyberattackIncindent

BleepingComputer

2.12.23

US seizes Sinbad crypto mixer used by North Korean Lazarus hackersCryptocurrency

BleepingComputer

2.12.23

How Continuous Pen Testing Protects Web Apps from Emerging ThreatsSecurity

BleepingComputer

2.12.23

Okta: October data breach affects all customer support system usersIncindent

BleepingComputer

2.12.23

New BLUFFS attack lets attackers hijack Bluetooth connectionsAttack

BleepingComputer

2.12.23

Google Chrome emergency update fixes 6th zero-day exploited in 2023Vulnerebility

BleepingComputer

2.12.23

Qilin ransomware claims attack on automotive giant YanfengRansom

BleepingComputer

2.12.23

Microsoft shares temp fix for Outlook crashes when sending emailsVulnerebility

BleepingComputer

2.12.23

DP World confirms data stolen in cyberattack, no ransomware usedRansom

BleepingComputer

2.12.23

Hackers start exploiting critical ownCloud flaw, patch nowExploit

BleepingComputer

2.12.23

Police dismantle ransomware group behind attacks in 71 countriesRansom

BleepingComputer

1.12.23

New FjordPhantom Android Malware Targets Banking Apps in Southeast AsiaAndroid

The Hacker News

1.12.23

Qakbot Takedown Aftermath: Mitigations and Protecting Against Future ThreatsVirus

The Hacker News

1.12.23

Chinese Hackers Using SugarGh0st RAT to Target South Korea and UzbekistanVirus

The Hacker News

1.12.23

Discover How Gcore Thwarted Powerful 1.1Tbps and 1.6Tbps DDoS AttacksAttack

The Hacker News

1.12.23

WhatsApp's New Secret Code Feature Lets Users Protect Private Chats with PasswordSocial

The Hacker News

1.12.23

U.S. Treasury Sanctions North Korean Kimsuky Hackers and 8 Foreign-Based AgentsBigBrothers

The Hacker News

1.12.23

Zyxel Releases Patches to Fix 15 Flaws in NAS, Firewall, and AP DevicesVulnerebility

The Hacker News

1.12.23

Zero-Day Alert: Apple Rolls Out iOS, macOS, and Safari Patches for 2 Actively Exploited FlawsOS

The Hacker News

1.12.23

Google Unveils RETVec - Gmail's New Defense Against Spam and Malicious EmailsSafety

The Hacker News