First Mobile Crypto Drainer on Google Play Steals $70K from Users
27
Sep
2024

First Mobile Crypto Drainer on Google Play Steals $70K from Users

A malicious app disguised as a legitimate WalletConnect tool targeted mobile users on Google Play. The app stole crypto assets…

Naveen Goud
27
Sep
2024

Growing data security concerns Over Facebook and Instagram Scam

In recent days, a significant number of UK users on Facebook and Instagram have fallen victim to a scam that…

Progress Software
27
Sep
2024

Progress Software Releases Patches for 6 Flaws in WhatsUp Gold – Patch Now

Sep 27, 2024Ravie LakshmananSoftware Security / Vulnerability Progress Software has released another round of updates to address six security flaws…

Microsoft Audio Bus Vulnerability Let Attackers Execute Remote Code
27
Sep
2024

Microsoft Audio Bus Vulnerability Let Attackers Execute Remote Code

Cisco Talos’ Vulnerability Research team revealed two significant vulnerabilities in Microsoft products that have been patched by the company over…

Hackers Targeting AI Agents And Conversational Platforms To Hijacking The Customer Sessions
27
Sep
2024

Hackers Targeting AI Agents And Conversational Platforms To Hijacking The Customer Sessions

Conversational AI platforms, powered by chatbots, are witnessing a surge in malicious attacks, which leverage NLP and ML are increasingly…

Hackers Could Remotely Control Kia Cars by Exploiting License Plates
27
Sep
2024

Hackers Could Remotely Control Kia Cars by Exploiting License Plates

A critical vulnerability in Kia vehicles allowed hackers to control cars remotely using only license plates. The flaw has been…

Jane Devry
27
Sep
2024

How to Stay Ahead of Deepfakes and Other Social Engineering Attacks

As companies work to reap the benefits of artificial intelligence (AI), they also must beware of its nefarious potential. Amid…

Kia logo
27
Sep
2024

Millions of Kia vehicles were vulnerable to remote attacks with just a license plate number

In June of 2024 security researchers uncovered a set of vulnerabilities in the Kia dealer portal that allowed them to…

Cyber companies need a best practice approach to major incidents.
27
Sep
2024

Cyber companies need a best practice approach to major incidents.

Cyber security companies have made global headlines recently with a series of significant incidents which caused widespread disruption. The CrowdStrike…

NIST Recommends New Rules for Password Security
27
Sep
2024

NIST Recommends New Rules for Password Security

The National Institute of Standards and Technology (NIST) has released updated guidelines for password security, marking a significant shift from…

LummaC2 Stealer Leverages Customized Control Flow Indirection For Execution
27
Sep
2024

LummaC2 Stealer Leverages Customized Control Flow Indirection For Execution

The LummaC2 obfuscator employs a novel control flow protection scheme designed specifically for its stealer component, which is part of…

Defaulting to open: Decoding the (very public) CrowdStrike event
27
Sep
2024

Defaulting to open: Decoding the (very public) CrowdStrike event

We live in an era of cyber ‘incidents,’ from WannaCry to MOVEit. However, it’s undeniably rare that a vendor finds…