CISA Warns of Exploited Vulnerabilities in Chrome and Excel Parsing Library
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent notice to federal agencies, setting a deadline of January 23 for mitigation efforts. The…
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent notice to federal agencies, setting a deadline of January 23 for mitigation efforts. The…
The attacker utilized the compromised Mandiant account to promote a cryptocurrency scam by posing as the Phantom crypto wallet and luring users with a fake…
Google addressed the issue with GCP-2023-047 on December 14, 2023; however, customers are urged to ensure they have installed the patch. Palo Alto Networks’ Unit…
The Xamalicious Backdoor can gain complete control over a targeted Android device without detection by the device’s security solution. McAfee’s Mobile Research Team has uncovered…
Scammers are peddling compromised and newly created Twitter Gold accounts, resulting in scams and disinformation. Cybersecurity researchers at CloudSEK have published a white paper titled “Gold Rush…
The ALPHV ransomware gang claimed responsibility for the attack on Transformative Healthcare in late April 2023 and exported a terabyte of data, including medical and…
The world of capital markets has changed dramatically over the past few years. Today, most transactions are conducted electronically and rely on sophisticated technology. In…
A hacker or hacker group, identified as “irleaks” (presumably indicating Iran Leaks), publicly disclosed the Snappfood cyber attack on Breach Forums and Telegram over New…
Fortunately for Radioactive Waste Management (RWM), the first-of-its-kind hacker attack on the project was unsuccessful. The United Kingdom’s Radioactive Waste Management (RWM) company overseeing the…
Is it impossible to crack Tesla autopilot? Not for these German researchers who’ve just unveiled ‘Elon Mode’ to exploit the popular autopilot feature. Three cybersecurity…
Microsoft has disabled the App Installer feature to protect users and prevent threat actors from maliciously exploiting its products and features. The ms-appinstaller URI scheme,…
The individuals confessed to creating variations of ransomware, enhancing the software through the utilization of OpenAI’s ChatGPT, carrying out vulnerability scans, infiltrating networks to secure…