WarLock Ransomware group Claims Breach at Colt Telecom and Hitachi
WarLock ransomware claims breach at Colt and Hitachi, with Colt investigating and working to restore systems while experts review the alleged data theft. When a…
WarLock ransomware claims breach at Colt and Hitachi, with Colt investigating and working to restore systems while experts review the alleged data theft. When a…
Use-after-free (UAF) vulnerabilities represent one of the most critical and prevalent security threats in modern software systems, particularly affecting applications written in memory-unsafe languages like…
Chinese-speaking cybercriminals are using ghost-tapping techniques to take advantage of Near Field Communication (NFC) relay tactics in a sophisticated evolution of payment card fraud. They…
Aug 18, 2025The Hacker NewsData Breach / Regulatory Compliance Organizations handling various forms of sensitive data or personally identifiable information (PII) require adherence to regulatory…
Expiration of a 2015 law at the end of September could dramatically reduce cyber threat information sharing within industry, as well as between companies and…
The alliance reflected the growing efforts in the country’s semiconductor industry and nascent AI sector to push forward Beijing’s tech self-sufficiency agenda – covering computing…
A critical security vulnerability has been discovered in Rockwell Automation’s ControlLogix Ethernet communication modules, potentially allowing remote attackers to execute arbitrary code on industrial control…
Phrack Magazine’s latest issue #72 has unveiled a significant data leak from a suspected North Korean hacking operation, including exploit tactics, compromised system details, and…
In a forward-looking proposal introduced last week, the Australian Competition and Consumer Commission (ACCC) has invited public submissions on a draft determination that would permit…
The State Department has demonstrated it does not understand that cyber power is critical to geopolitical power. In the course of reorganizing offices and reducing…
The article, entitled “How can we trust you, Nvidia”, called on the US company to “comply with requests and provide convincing proof of security” to…
Enterprise software giant Workday has disclosed a security incident involving unauthorized access to employee information through a compromised third-party customer relationship management (CRM) platform. The…