BADBOX 2.0 Botnet Infects 1 Million Android Devices for Ad Fraud and Proxy Abuse
Mar 18, 2025Ravie LakshmananCyber Attack / Malware At least four different threat actors have been identified as involved in an updated version of a massive…
Mar 18, 2025Ravie LakshmananCyber Attack / Malware At least four different threat actors have been identified as involved in an updated version of a massive…
Everywoman has announced the winners of its 2025 Everywoman in Technology Awards, sponsored by Bupa. This the 15th year Everywoman has celebrated women in the…
Attackers are actively exploiting a Server-Side Request Forgery (SSRF) vulnerability in OpenAI’s ChatGPT infrastructure. The vulnerability, identified as CVE-2024-27564, has become a significant threat despite its…
A critical cybersecurity alert has been issued following the active exploitation of a Server-Side Request Forgery (SSRF) vulnerability in OpenAI’s ChatGPT infrastructure. According to the…
Amazon has announced its Echo devices will no longer have the option to store and process requests on the device itself, meaning your voice recordings…
Mar 18, 2025Ravie LakshmananCyber Espionage / Malware Threat hunters have shed more light on a previously disclosed malware campaign undertaken by the China-aligned MirrorFace threat…
The secure network component of Finland’s quantum computer project has taken a significant leap forward in the wake of successful ultra-secure novel encryption technology (NET)…
Google has introduced the OSV-Scanner tool, a crucial addition to the open-source security ecosystem. Alongside it, Google also released OSV-SCALIBR, a library designed to streamline…
A sophisticated cyberattack technique known as Browser-in-the-Middle (BitM) has emerged, enabling hackers to bypass multi-factor authentication (MFA) and steal user sessions in mere seconds. This…
Cloudflare has announced the implementation of post-quantum cryptography across its services. This advancement is part of a broader effort to protect customers from potential quantum…
Mar 18, 2025The Hacker NewsAuthentication / Identity Security While Okta provides robust native security features, configuration drift, identity sprawl, and misconfigurations can provide opportunities for…
GitHub Action tj-actions/changed-files was compromised in supply chain attack Pierluigi Paganini March 18, 2025 The GitHub Action tj-actions/changed-files was compromised, enabling attackers to extract secrets…