The UK government has issued a draft of its strategic priorities for Ofcom under the Online Safety Act (OSA), which…
Hacker obtained documents tied to lawsuit over Matt Gaetz’s sexual misconduct allegations Pierluigi Paganini November 20, 2024 A hacker allegedly…
North Korean IT workers, operating under the cluster CL-STA-0237, have been implicated in recent phishing attacks leveraging malware-infected video conference…
LockBit Ransomware Breach Exposes Sensitive Data of 21K Equinox Customers Equinox, a prominent healthcare service provider based in New York,…
Water Barghest, a sophisticated botnet, exploits vulnerabilities in IoT devices to enlist them in a residential proxy marketplace by leveraging…
Aqua Nautilus’ research reveals hackers are leveraging vulnerable and misconfigured Jupyter Notebook servers to steal live sports streams. Learn about…
Ford is investigating allegations that it suffered a data breach after a threat actor claimed to leak 44,000 customer records…
APT31, using the Rekoobe backdoor, has been observed targeting TradingView, a popular financial platform, as researchers discovered malicious domains mimicking…
20 Nov Who’s managing cybersecurity at organizations that don’t have a CISO? This week in cybersecurity from the editors at…
Oracle Linux offers a secure, streamlined platform for deploying and managing applications across on-premises, cloud, and edge environments. Designed for…
Tech support scammers are again stooping low with their email campaigns. This particular one hints that one of your contacts…
Nov 20, 2024Ravie LakshmananPayment Security / Cybercrime Threat actors are increasingly banking on a new technique that leverages near-field communication…











