Bitcoin ATM Giant Byte Federal Hit by Hackers, 58,000 Users Impacted
SUMMARY Byte Federal, the largest US Bitcoin ATM operator, suffered a data breach affecting 58,000 customers. Hackers exploited a vulnerability in GitLab to access sensitive…
SUMMARY Byte Federal, the largest US Bitcoin ATM operator, suffered a data breach affecting 58,000 customers. Hackers exploited a vulnerability in GitLab to access sensitive…
Explore the professions most vulnerable to cybersecurity threats in 2025, from IT pros to crypto investors. Learn how to stay safe and reduce risks in…
Learn how cryptocurrency’s rapid growth brings risks like fake payment gateways and online scams. Discover tips to stay safe, avoid theft, and protect your data…
SUMMARY Sanctions on Chinese Firm: The US sanctioned Sichuan Silence Information Technology and employee Guan Tianfeng for exploiting a firewall vulnerability in a major global…
SUMMARY Global Dismantling of DDoS Platforms: Law enforcement from 15 countries shut down 27 websites offering DDoS attack services as part of Operation PowerOFF. Arrests…
SUMMARY: Researchers found a rise in phishing attacks in the UAE impersonating Dubai Police via SMS. Attackers use fake domains with typosquatting and suspicious extensions…
You are not alone, ChatGPT and Sora AI are down worldwide. OpenAI says it is aware of the issue and working on a fix. ChatGPT,…
The rise of social media and digital communication has transformed how we connect, but it has also opened the door to cybercrime and harmful behaviours,…
SUMMARY Cyberattack Reported: Krispy Kreme faced a cyberattack on November 29, 2024, disrupting online orders in the U.S. Operations Impact: In-store sales and deliveries remained…
SUMMARY Dubbed AuthQuake; the flaw in Microsoft MFA allowed attackers to bypass security measures and access accounts. Vulnerability impacted Azure, Office 365, and other Microsoft…
SUMMARY A sophisticated phishing campaign is targeting employees of 30+ companies across 12 industries worldwide. Over 200 malicious links have been distributed, designed to steal…
SUMMARY The new DCOM attack leverages Windows Installer service for stealthy backdoor deployment. Attack exploits the IMsiServer interface for remote code execution and persistence. Malicious…