Beware of Fake AI Scam Calls that Takeover Your Gmail Account
14
Oct
2024

Beware of Fake AI Scam Calls that Takeover Your Gmail Account

Scammers use sophisticated AI technology to impersonate tech giants like Google, aiming to take over unsuspecting users’ Gmail accounts. A…

Ivanti CSA Flaws
14
Oct
2024

Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration

Oct 14, 2024Ravie LakshmananNetwork Security / Vulnerability A suspected nation-state adversary has been observed weaponizing three security flaws in Ivanti…

Game Freak Cyberattack   
14
Oct
2024

Game Freak Cyberattack: Major Data Breach Exposed

Game Freak, the renowned developer behind the Pokémon franchise, has suffered a cyberattack that has led to the unauthorized leaking…

North Korean Posing as Recruiters to Attack Job Seekers Device
14
Oct
2024

North Korean Posing as Recruiters to Attack Job Seekers Device

Hackers target job seekers primarily for financial gain and to obtain sensitive personal information.  Many job seekers are vulnerable due…

pac4j Java Framework Vulnerable to RCE Attacks
14
Oct
2024

pac4j Java Framework Vulnerable to RCE Attacks

A critical security vulnerability has been discovered in the popular Java framework pac4j. The vulnerability specifically affects versions before 4.0…

Gmail Scam Targets Users With AI-Driven Deception
14
Oct
2024

Gmail Scam Targets Users With AI-Driven Deception

A new scam has emerged, specifically targeting Gmail users with the intent of stealing personal data through cleverly designed fake…

Dutch police dismantled dual dark web market 'Bohemia/Cannabia'
14
Oct
2024

Dutch police dismantled dual dark web market ‘Bohemia/Cannabia’

Dutch police dismantled dual dark web market ‘Bohemia/Cannabia’ Pierluigi Paganini October 14, 2024 Dutch police dismantled Bohemia/Cannabia, two major dark…

Gmail Users Beware Of AI Scam that Takeovers Your Gmail Account
14
Oct
2024

Gmail Users Beware Of AI Scam Calls that Takeovers Your Gmail Account

A sophisticated new scam targeting Gmail users has emerged, using artificial intelligence to trick victims into surrendering control of their…

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication
14
Oct
2024

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

2FA enhances security by requiring two distinct forms of identification before granting access to an account or service. Though 2FA…

Apache Roller CSRF Vulnerability Let Attackers Escalate privileges
14
Oct
2024

Apache Roller CSRF Vulnerability Let Attackers Escalate privileges

The Apache Roller team revealed a critical security update addressing a Cross-Site Request Forgery (CSRF) vulnerability that could allow attackers…

Veeam Vulnerability Ransowmare
14
Oct
2024

Critical Veeam Vulnerability Exploited to Spread Akira and Fog Ransomware

Oct 14, 2024Ravie LakshmananRansomware / Vulnerability Threat actors are actively attempting to exploit a now-patched security flaw in Veeam Backup…

GitGuardian Visual Studio Code extension helps developers protect their sensitive information
14
Oct
2024

GitGuardian Visual Studio Code extension helps developers protect their sensitive information

Stolen credentials remain the most common cause of a data breach. Various methods exist to prevent such breaches, and the…