Nintendo
14
Oct
2024

Pokemon dev Game Freak confirms breach after stolen data leaks online

Japanese video game developer Game Freak has confirmed it suffered a cyberattack in August after source code and game designs…

OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details
14
Oct
2024

OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details

OilRig hackers (aka Earth Simnavaz, APT34, OilRig) is a cyber espionage group that was linked to “Iranian” interests. This APT…

TrickMo Malware Attacking Android Devices To Steal Unlock Patterns And PINs
14
Oct
2024

TrickMo Malware Attacking Android Devices To Steal Unlock Patterns And PINs

The recent discovery of the TrickMo Banking Trojan variant by Cleafy has prompted further investigation, where researchers have identified 40…

Transforming Security Testing With AI: Benefits and Challenges
14
Oct
2024

Transforming Security Testing With AI: Benefits and Challenges

Security testing plays a critical role in ensuring that applications are protected against vulnerabilities and attacks. In times when cyber…

Supply Chain Attack Leveraging Entry Points
14
Oct
2024

Supply Chain Attack Leveraging Entry Points in PyPI, npm, Ruby Gems & NuGet

A sophisticated supply chain attack has been identified, leveraging entry points in popular open-source package repositories, including PyPI (Python), npm…

CoreWarrior Malware Attacking Windows Machines With Self-replication Capabilities
14
Oct
2024

CoreWarrior Malware Attacking Windows Machines With Self-replication Capabilities

Malware targeting Windows machines continues to be a significant threat. While these threats could be in various forms like viruses,…

The War on Passwords Is One Step Closer to Being Over
14
Oct
2024

The War on Passwords Is One Step Closer to Being Over

The password-killing tech known as “passkeys” have proliferated over the last two years, developed by the tech industry association known…

Researchers Win $70K for Reporting Zero-Day Flaws in EV Chargers
14
Oct
2024

Zero-day Flaws Exposed EV Chargers to Shutdowns and Data Theft

NCC Group experts share details of how they exploited critical zero-day vulnerabilities in Phoenix Contact EV chargers (electric vehicles chargers)…

Cyble Vulnerability Intelligence Reports New Cyberattacks
14
Oct
2024

Cyble Vulnerability Intelligence Reports New Cyberattacks

Cyble’s Vulnerability Intelligence unit has spotlighted a series of cyberattacks targeting critical vulnerabilities in various software systems, including the Ruby…

pac4j Vulnerable To RCE Attacks
14
Oct
2024

Popular Java Framework pac4j Vulnerable To RCE Attacks

A critical security vulnerability has been identified in the popular Java security framework, pac4j, specifically affecting versions prior to 4.0….

Researchers Win $70K for Reporting Zero-Day Flaws in EV Chargers
14
Oct
2024

Researchers Win $70K for Reporting Zero-Day Flaws in EV Chargers

NCC Group experts share details of how they exploited critical zero-day vulnerabilities in Phoenix Contact EV chargers (electric vehicles chargers)…

Supply Chain Attacks
14
Oct
2024

Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems

Cybersecurity researchers have found that entry points could be abused across multiple programming ecosystems like PyPI, npm, Ruby Gems, NuGet,…