SugarGh0st RAT Campaign Targets U.S. AI Experts
Researchers have identified a recent cyber espionage campaign by a China-linked threat actor dubbed “UNK_SweetSpecter,” which aims to harvest generative artificial intelligence (AI) secrets from…
Researchers have identified a recent cyber espionage campaign by a China-linked threat actor dubbed “UNK_SweetSpecter,” which aims to harvest generative artificial intelligence (AI) secrets from…
Starting in July, Microsoft will begin gradually enforcing multi-factor authentication (MFA) for all users signing into Azure to administer resources. After first completing the rollout…
Businesses today are highly concerned about preventing fraud in this age. As technology advances, so do activities, making it crucial for companies to implement security…
The Securities and Exchange Commission (SEC) has adopted amendments to Regulation S-P that require certain financial institutions to disclose data breach incidents to impacted individuals…
May 17, 2024NewsroomCryptojacking / Malware The cryptojacking group known as Kinsing has demonstrated its ability to continuously evolve and adapt, proving to be a persistent…
Failures in the technology market are prompting discussions in government over whether the UK will ultimately need to legislate to force IT suppliers to secure…
The U.S. Justice Department charged five individuals today, a U.S. Citizen woman, a Ukrainian man, and three foreign nationals, for their involvement in cyber schemes…
A security researcher identified a vulnerability in TeslaLogger, a third-party software used to collect data from Tesla vehicles, that leveraged insecure default settings that could…
The U.S. Department of Justice charged two suspects for allegedly leading a crime ring that laundered at least $73 million from cryptocurrency investment scams, also…
Threat intelligence feeds provide real-time updates on indicators of compromise (IOCs), such as malicious IPs and URLs. Security researchers and organizations share IOCs with feed…
ShinyHunters, the hacker group and primary administrator of Breach Forums informed Hackread.com that they regained access to the forum’s clear net and dark web domains…
Cyber insurance provides financial protection for businesses in the event of a cyber attack. However, despite its benefits, there are several drawbacks to consider before…