Awaken Likho APT group targets Russian government with a new implant
Awaken Likho APT group targets Russian government with a new implant Pierluigi Paganini October 09, 2024 A threat actor tracked as Awaken Likho is targeting…
Awaken Likho APT group targets Russian government with a new implant Pierluigi Paganini October 09, 2024 A threat actor tracked as Awaken Likho is targeting…
Discord has been suddenly blocked in Russia and Turkey since yesterday due to illegal activity residing on the platform, leaving legitimate users in those countries…
A Boot Sector Virus is a type of malware that targets the boot sector of a computer’s hard drive or any other storage device, such…
Cybersecurity Ventures predicts the global annual cost of cybercrime to reach $9.5 trillion USD in 2024. Viewed as gross domestic product, that would make it…
The Australian government has announced its first standalone cybersecurity law, known as the Cyber Security Bill 2024 to upgrade the nation’s defenses against increasingly complex…
The Russian Federal Service for Supervision of Communications, Information Technologies, and Mass Media has officially blocked the popular communication platform Discord within the country. This…
Hackers have infiltrated the Japan Aerospace Exploration Agency (JAXA), compromising the accounts of several high-ranking officials, including President Hiroshi Yamakawa. This alarming incident is part…
Oct 09, 2024The Hacker NewsSaaS Security / Identity Security Social media accounts help shape a brand’s identity and reputation. These public forums engage directly with…
Stealing personal data information (‘name’, ‘Social Security number’, ‘credit card details’, etc.) for fraudulent activities is dubbed “identity theft.” While these types of cybercrimes are…
The sophisticated ransomware group Dark Angels, active since 2022, targets large companies for substantial ransom payments by employing third-party ransomware payloads like Babuk, RTM Locker,…
Adobe announced a series of important security updates aimed at addressing several vulnerabilities across its product suite. These vulnerabilities could potentially allow cybercriminals to execute…
Air-gapped systems are security measures that isolate “computers” and “networks” from external connections (like the “internet”) to block ‘unauthorized access’ and ‘cyber threats.’ This…