We need a judge-led inquiry into police spying on journalists and lawyers
18
Jun
2024

We need a judge-led inquiry into police spying on journalists and lawyers

In August 2018, documentary filmmaker Trevor Birney and myself, Barry McCaffry, were arrested in early morning raids on our homes…

Akira Ransomware Claims TETRA Technologies Cyberattack
18
Jun
2024

Akira Ransomware Claims TETRA Technologies Cyberattack

TETRA Technologies, Inc., a diversified oil and gas services company operating through divisions including Fluids, Production Testing, Compression, and Offshore,…

DSOP phishing lure
18
Jun
2024

Linux Malware Uses Discord Emojis To Communicate With Attackers

Cybersecurity researchers are tracking a novel Linux malware campaign that makes use of Discord emojis for command and control (C2)…

Multiple VMware vCenter Server Flaws Allow Remote Code Execution
18
Jun
2024

Multiple VMware vCenter Server Flaws Allow Remote Code Execution

VMware has released a critical security advisory, VMSA-2024-0012, addressing multiple vulnerabilities in VMware vCenter Server, a core component of VMware…

New ARM 'TIKTAG' Attack
18
Jun
2024

Europol Taken Down 13 Websites Linked to Terrorist Operations

Europol and law enforcement agencies from ten countries have taken down 13 websites linked to terrorist operations. The joint operation,…

Naveen Goud
18
Jun
2024

Ransomware related news headlines trending on Google

Panera Bread, known for its bakery products, reportedly succumbed to ransomware hackers’ demands following an attack in March 2024. The…

Los Angeles County DPH Data Breach: Sensitive Data Exposed
18
Jun
2024

Los Angeles County DPH Data Breach: Sensitive Data Exposed

The Los Angeles County Department of Public Health (DPH) has disclosed a significant data breach impacting more than 200,000 individuals….

Chinese Threat Actors Hacking F5 Load Balancers for Last Two Years
18
Jun
2024

Chinese Threat Actors Hacking F5 Load Balancers for Last Two Years

Hackers often focus on F5 Load Balancers for several reasons, as these are many enterprise networks’ vital parts that balance…

New ARM 'TIKTAG' Attack Impacts Google Chrome, Linux Systems
18
Jun
2024

New ARM ‘TIKTAG’ Attack Impacts Google Chrome, Linux Systems

Memory corruption lets attackers hijack control flow, execute code, elevate privileges, and leak data. ARM’s Memory Tagging Extension (MTE) aims…

How to create your cybersecurity "Google Maps": A step-by-step guide for security teams
18
Jun
2024

How to create your cybersecurity “Google Maps”: A step-by-step guide for security teams

Cybersecurity isn’t just about firewalls and antivirus. It’s about understanding how your defenses, people, and processes work together. Just like…

Enhancing security through collaboration with the open-source community
18
Jun
2024

Enhancing security through collaboration with the open-source community

In this Help Net Security interview, Alan DeKok, CEO at NetworkRADIUS, discusses the need for due diligence in selecting and…

Mass exploitation is the new primary attack vector for ransomware
18
Jun
2024

Mass exploitation is the new primary attack vector for ransomware

The cyber threat landscape in 2023 and 2024 has been dominated by mass exploitation, according to WithSecure. Edge service KEV…