CISA
19
Aug
2024

CISA warns of Jenkins RCE bug exploited in ransomware attacks

​CISA has added a critical Jenkins vulnerability that can be exploited to gain remote code execution to its catalog of…

Styx Stealer
19
Aug
2024

Styx Stealer Malware Stealing Browser And Instant Messenger Data

Recently cybersecurity researchers at Check Point discovered a new malware dubbed “Styx Stealer,” capable of stealing browser and instant messenger…

AI SPERA and Hackers Central Partner to Expand Mexico’s Security Market with 'Criminal IP ASM'
19
Aug
2024

AI SPERA and Hackers Central Partner to Expand Mexico’s Security Market with ‘Criminal IP ASM’

AI SPERA, a leading Cyber Threat Intelligence (CTI) company, has announced a strategic partnership with Hackers Central, a major cybersecurity…

Stolen, locked payment cards can be used with digital wallet apps
19
Aug
2024

Stolen, locked payment cards can be used with digital wallet apps

Fraudsters can add stolen payment cards to digital wallet apps and continue making online purchases even after victims’ report the…

CXL moves forward as memory technology for AI
19
Aug
2024

CXL moves forward as memory technology for AI

Compute Express Link (CXL), the technology for connecting memory, was among the themes at last week’s Future of Memory and Storage…

Researchers uncovered new infrastructure linked to the cybercrime group FIN7
19
Aug
2024

Researchers uncovered new infrastructure linked to the cybercrime group FIN7

Researchers uncovered new infrastructure linked to the cybercrime group FIN7 Pierluigi Paganini August 19, 2024 Team Cymru, Silent Push and…

TOYOTA Data Breach
19
Aug
2024

TOYOTA Data Breach – Hackers Leaked 240 GB of Data Online

Toyota’s U.S. branch has reportedly suffered a massive data breach, resulting in the unauthorized release of approximately 240 GB of…

How might the UK's cyber landscape change under Labour?
19
Aug
2024

How might the UK’s cyber landscape change under Labour?

The recent electoral success of the Labour Party opens up the possibility of significant changes in the nation’s cyber security…

Microsoft macOS Apps Vulnerability
19
Aug
2024

Microsoft macOS Apps Vulnerability Allows Hackers to Record Audio/Video

Cisco Talos has identified eight security vulnerabilities in Microsoft applications running on the macOS operating system, raising concerns about potential…

Challenges of deploying PQC globally
19
Aug
2024

Challenges of deploying PQC globally

The US National Institute of Standards and Technology (NIST) has announced three standards for post-quantum cryptography (PQC). But for PQC…

Hackers
19
Aug
2024

Hackers linked to $14M Holograph crypto heist arrested in Italy

Suspected hackers behind the heist of $14,000,000 worth of cryptocurrency from blockchain tech firm Holograph was arrested in Italy after…

Kubernetes Vulnerability
19
Aug
2024

Kubernetes Vulnerability Allows Attackers to Access Clusters Remotely

A critical vulnerability tracked as CVE-2024-7646, has been uncovered in the widely used ingress-nginx Kubernetes controller. The flaw allows attackers…