INTERPOL To Replace ‘Pig Butchering’ Term With “Romance Baiting”
18
Dec
2024

INTERPOL To Replace ‘Pig Butchering’ Term With “Romance Baiting”

INTERPOL is advocating for a shift in terminology to combat online relationships and investment fraud. The international police organization is…

New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials
18
Dec
2024

New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials

The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing campaigns.  Delivered as attachments disguised as…

Cybersecurity At the Crossroads: The Role Of Private Companies In Safeguarding U.S. Critical Infrastructure
18
Dec
2024

Cybersecurity At the Crossroads: The Role Of Private Companies In Safeguarding U.S. Critical Infrastructure

In an era where we are completely reliant on digital connectivity, the security of our critical infrastructure is paramount. CISA defines…

The Need for Specialized AI Models in Today’s Transforming Industry Challenges
18
Dec
2024

The Need for Specialized AI Models in Today’s Transforming Industry Challenges

Owing to its relative nascency, the realm of artificial intelligence (AI) has continued to undergo a rapid transformation while being…

End-to-End OS Platform
18
Dec
2024

Introducing our End-to-End OS Platform

Having been at ActiveState for nearly eight years, I’ve seen many iterations of our product. However, one thing has stayed…

Top 10 cyber security stories of 2024
18
Dec
2024

Top 10 cyber security stories of 2024

The year 2024 threw up another diverse crop of stories in the world of cyber security, with much to pay…

INTERPOL Urges to End 'Pig Butchering' & Replaces With "Romance Baiting"
18
Dec
2024

INTERPOL Urges to End ‘Pig Butchering’ & Replaces With “Romance Baiting”

INTERPOL has called for the term “romance baiting” to replace “pig butchering,” a phrase widely used to describe a manipulative…

Androxgh0st Botnet Targets IoT Devices, Exploiting 27 Vulnerabilities
18
Dec
2024

Androxgh0st Botnet Targets IoT Devices, Exploiting 27 Vulnerabilities

KEY POINTS Rapid Vulnerability Exploitation: The Androxgh0st botnet has expanded its arsenal, exploiting 27 vulnerabilities across web servers, IoT devices,…

European companies hit with effective DocuSign-themed phishing emails
18
Dec
2024

European companies hit with effective DocuSign-themed phishing emails

A threat actor looking to take over the Microsoft Azure cloud infrastructure of European companies has successfully compromised accounts of…

The Security Interviews: Martin Lee, Cisco Talos
18
Dec
2024

The Security Interviews: Martin Lee, Cisco Talos

The first thing worth knowing about the first ever ransomware locker is that its use was apparently motivated by revenge…

BADBOX Botnet Hacked 74,000 Android Devices With Customizable Remote Codes
18
Dec
2024

BADBOX Botnet Hacked 74,000 Android Devices With Customizable Remote Codes

The BADBOX botnet, a sophisticated cybercriminal operation, has compromised approximately 74,000 devices, including Android TV boxes, smartphones, and other electronics….

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections
18
Dec
2024

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed “I2PRAT,” which leverages encrypted peer-to-peer (P2P) communication…