Hackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms
03
Dec
2024

Hackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms

Cybercriminals are leveraging AI-powered phishing attacks, website cloning tools, and RCE exploits to target e-commerce platforms during the holiday season,…

Data Vigilante Leaks 772K Employee Records from Top Firms and 12.3M-Row Database
03
Dec
2024

Data Vigilante Leaks 772K Employee Records from Top Firms and 12.3M-Row Database

SUMMARY MOVEit Flaw and Data Leak: Data stolen during the MOVEit hack spree is still creating issues for companies. Nam3L3ss…

All businesses want for Christmas is a clear definition of AI
03
Dec
2024

All businesses want for Christmas is a clear definition of AI

As 2024 winds down, artificial intelligence (AI) has definitely been one of the year’s biggest game-changers in business. 65% of…

PEFT-As-An-Attack, Jailbreaking Language Models For Malicious Prompts
03
Dec
2024

PEFT-As-An-Attack, Jailbreaking Language Models For Malicious Prompts

Federated Parameter-Efficient Fine-Tuning (FedPEFT) is a technique that combines parameter-efficient fine-tuning (PEFT) with federated learning (FL) to improve the efficiency…

DMM Bitcoin halts operations six months after a $300 million cyber heist
03
Dec
2024

DMM Bitcoin halts operations six months after a $300 million cyber heist

DMM Bitcoin halts operations six months after a $300 million cyber heist Pierluigi Paganini December 03, 2024 The Japanese cryptocurrency…

Location tracking
03
Dec
2024

FTC bans data brokers from selling Americans’ sensitive location data

Today, the FTC banned data brokers Mobilewalla and Gravy Analytics from harvesting and selling Americans’ location tracking data linked to…

Storm-1811 Hackers Exploits RMM Tools to Deliver Black Basta Ransomware
03
Dec
2024

Storm-1811 Hackers Exploits RMM Tools to Deliver Black Basta Ransomware

Storm-1811, a financially driven threat actor that employs social engineering techniques, has recently been observed exploiting RMM tools to distribute…

Naveen Goud
03
Dec
2024

Apple espionage on its employees iPhones and iCloud accounts

In recent years, we have witnessed a growing trend of surveillance by various entities—ranging from individuals to state actors and…

Criminal holding a phone
03
Dec
2024

Police seize Matrix encrypted chat service after spying on criminals

An international law enforcement operation codenamed ‘Operation Passionflower’ has shut down MATRIX, an encrypted messaging platform used by cybercriminals to…

SmokeLoader Malware Attacking Windows Users Exploiting XLS And DOC Vulnerabilities
03
Dec
2024

SmokeLoader Malware Attacking Windows Users Exploiting XLS And DOC Vulnerabilities

The notorious SmokeLoader malware has been identified targeting firms in Taiwan, including those in manufacturing, healthcare, information technology, and other…

Police takes down Matrix encrypted chat service used by criminals
03
Dec
2024

Police takes down Matrix encrypted chat service used by criminals

A joint investigation team involving French and Dutch authorities has taken down Matrix, yet another end-to-end encrypted chat service created…

Microsoft hit with £1bn UK legal claim over ‘anti-competitive’ cloud licensing tactics
03
Dec
2024

Microsoft hit with £1bn UK legal claim over ‘anti-competitive’ cloud licensing tactics

 Microsoft has found itself on the receiving end of £1bn legal action, filed on behalf of thousands of UK businesses…