Researchers Uncover Phishing-As-A-Service Domains Associated With Tycoon 2FA
02
Jan
2025

Researchers Uncover Phishing-As-A-Service Domains Associated With Tycoon 2FA

The Tycoon 2FA platform is a Phishing-as-a-Service (PhaaS) tool that enables cybercriminals to easily launch sophisticated phishing attacks targeting two-factor…

Microsoft Dynamics 365 and Power Apps Web API
02
Jan
2025

Severe Security Flaws Patched in Microsoft Dynamics 365 and Power Apps Web API

Jan 02, 2025Ravie LakshmananVulnerability / Data Protection Details have emerged about three now-patched security vulnerabilities in Dynamics 365 and Power…

Sir Alan Bates has ‘serious concerns’ over Post Office scandal compensation budget
02
Jan
2025

Sir Alan Bates has ‘serious concerns’ over Post Office scandal compensation budget

Sir Alan Bates has “serious concerns” that the government’s budget for Post Office scandal compensation will be stretched to cover…

New PLAYFULGHOST Malware Hacking Devices To Remotely Capture Audio Recordings
02
Jan
2025

New PLAYFULGHOST Malware Hacking Devices To Remotely Capture Audio Recordings

PLAYFULGHOST, a Gh0st RAT variant, leverages distinct traffic patterns and encryption, which spread via phishing emails and SEO poisoning of…

20 Best Cybercrime Blogs and Websites in 2025
02
Jan
2025

20 Best Cybercrime Blogs and Websites in 2025

FeedSpot named Cybercrime Magazine no. 1 on it’s list of 20 Best Cybercrime Blogs you should follow in 2025. The best…

PoC Exploit Released for Critical Windows LDAP RCE Vulnerability
02
Jan
2025

PoC Exploit Released For Critical Windows LDAP RCE Vulnerability

The CVE-2024-49112 vulnerability in Windows LDAP allows remote code execution on unpatched Domain Controllers, as a zero-click exploit leverages this…

Nitrogen Ransomware Attacks Organizations, Encrypts Files With .NBA Extension
02
Jan
2025

Nitrogen Ransomware Attacks Organizations, Encrypts Files With .NBA Extension

A new ransomware strain, dubbed Nitrogen, has emerged as a significant threat over the past four months, targeting organizations across…

Windows 11 BitLocker Encryption Bypassed to Extract Full Volume Encryption Keys
02
Jan
2025

Windows 11 BitLocker Encryption Bypassed to Extract Full Volume Encryption Keys

A cybersecurity researcher has demonstrated a method to bypass BitLocker encryption on Windows 11 (version 24H2) by extracting full volume…

Espionage for Russian Secret Service
02
Jan
2025

Three Russian-German Nationals Charged with Espionage for Russian Secret Service

Jan 02, 2025Ravie LakshmananCyber Espionage / Hacking German prosecutors have charged three Russian-German nationals for acting as secret service agents…

My LinkedIn Account Hacking 
02
Jan
2025

My LinkedIn Account Hacking Story: A Personal Journey

The first night of New Year brought in a terrifying moment for me that many professionals fear in the online…

Windows 11 BitLocker Encryption Bypassed To Extract Volume Encryption Keys
02
Jan
2025

Windows 11 BitLocker Encryption Bypassed To Extract Volume Encryption Keys

Researchers have demonstrated a method to bypass Windows 11’s BitLocker encryption, enabling the extraction of Full Volume Encryption Keys (FVEKs)…

Trend Micro Apex One Vulnerabilities Let Escalate Privilege
02
Jan
2025

Trend Micro Apex One Vulnerabilities Let Escalate Privilege

72 Hours to Audit-Ready API Security APIs present a unique challenge in this landscape, as risk assessment and mitigation are…