Qilin Ransomware Upgrades and Now Steals Google Chrome Credentials
Qilin ransomware is evolving, now targeting Google Chrome credentials. Learn how this new tactic expands their attack arsenal and how organizations can protect themselves. Discover…
Qilin ransomware is evolving, now targeting Google Chrome credentials. Learn how this new tactic expands their attack arsenal and how organizations can protect themselves. Discover…
Infamous hacker USDoD, linked to major data breaches, reveals his identity as a Brazilian citizen. Discover the implications and how Brazil’s extradition treaty with the…
Fur Affinity’s domain and Twitter were compromised in a major DNS hijacking on August 20, 2024. Hackers redirected users to malicious sites, sparking fears of…
Cary, North Carolina, August 22nd, 2024, CyberNewsWire INE Security, a global cybersecurity training and certification provider, recently launched initiatives with several higher education institutions in…
Microchip Technology hit by cyberattack, disrupting manufacturing operations. A major disruption to semiconductor production has been reported, impacting the company’s ability to meet customer orders.…
Designers and engineers are always searching for tools to speed up their work and create more complex designs. Parametric modeling is promising to revolutionize the…
Bangladeshi hackers “SYSTEMADMINBD” defaced Zee Media’s website, accusing them of mocking the situation in Bangladesh amid severe flooding. The hack follows the resignation of Prime…
Millions of office and hotel contactless access cards using Fudan Microelectronics chips are vulnerable to a hardware backdoor allowing attackers with brief physical proximity to…
The new PG_MEM malware targets PostgreSQL databases, exploiting weak passwords to deliver payloads and mine cryptocurrency. Researchers warn that 800,000 publicly accessible instances are vulnerable.…
ALBeast is a critical vulnerability that allows attackers to bypass authentication and authorization in AWS ALB-based applications. Learn how to mitigate this risk and protect…
Cybercriminals exploit Progressive Web Apps (PWAs) in the latest phishing scam, targeting mobile users in Czechia, Hungary, and Georgia. Learn how to protect yourself from…
Meet TodoSwift, a malicious application that masquerades as a PDF downloader. Crafted by the BlueNoroff threat group, TodoSwift leverages Apple’s Swift/SwiftUI to present a decoy PDF…