Leaked Wallpaper Exploit Let Attackers Escalate Privilege on Windows Systems
05
Aug
2024

Leaked Wallpaper Exploit Let Attackers Escalate Privilege on Windows Systems

A critical security flaw in Windows’ wallpaper handling mechanism has been uncovered. It allows attackers to gain system-level privileges on…

Hackers Infect Windows With Backdoor Malware Via "Car For Sale" Ad
05
Aug
2024

Hackers Infect Windows With Backdoor Malware Via “Car For Sale” Ad

Fighting Ursa, a Russian APT, has employed a car sales phishing lure to distribute the HeadLace backdoor malware targeting diplomats…

Chinese hackers compromised an ISP to deliver malicious software updates
05
Aug
2024

Chinese hackers compromised an ISP to deliver malicious software updates

APT StormBamboo compromised a undisclosed internet service provider (ISP) to poison DNS queries and thus deliver malware to target organizations,…

Children's privacy, Privacy watchdog, ICO, Social Media Platforms, Video-Streaming Platforms
05
Aug
2024

UK Privacy Watchdog Targets Social Media For Children’s Privacy Violations

British regulators are demanding that 11 social media and video-sharing platforms bolster their protections for children’s privacy. The move follows…

APT41 Hackers Attacking Research Institute with ShadowPad and Cobalt Strike
05
Aug
2024

APT41 Attacking Research Institute with ShadowPad & Cobalt Strike

Cisco Talos has unearthed a sophisticated cyber-espionage campaign targeting a Taiwanese government-affiliated research institute. The attack, attributed to the notorious…

How Project 2025 Would Put US Elections at Risk
05
Aug
2024

How Project 2025 Would Put US Elections at Risk

If anything, the military has impinged on CISA’s territory—not the other way around—out of exasperation with the civilian agency’s constrained…

Researchers Details How Hackers Can Steal Passwords via HDMI Cables
05
Aug
2024

Researchers Details How Hackers Can Steal Passwords via HDMI Cables

Security researchers have found a new way for hackers to steal sensitive information like passwords by eavesdropping on HDMI cables….

Wazuh
05
Aug
2024

Enhancing Incident Response Readiness with Wazuh

Incident response is a structured approach to managing and addressing security breaches or cyber-attacks. Security teams must overcome challenges such…

Keytronic Takes $15 Million Hit From Ransomware Attack
05
Aug
2024

Keytronic Takes $15 Million Hit From Ransomware Attack

Electronics manufacturing services firm Keytronic has revealed that a recent ransomware attack has resulted in additional expenses and lost revenue…

A flaw in Rockwell Automation ControlLogix 1756 could expose critical control systems to unauthorized access
05
Aug
2024

A flaw in Rockwell Automation ControlLogix 1756 could expose critical control systems to unauthorized access

A flaw in Rockwell Automation ControlLogix 1756 could expose critical control systems to unauthorized access Pierluigi Paganini August 05, 2024…

Threat Actor Groups Using Leaked Ransomware Variants To Launch Attacks
05
Aug
2024

Threat Actor Groups Using Leaked Ransomware Variants To Launch Attacks

Ransomware operators often acquire malware through purchases on the dark web, group affiliations, and leaked source codes rather than developing…

Hackers Hijacked ISP Service Provider To Poison Software Updates
05
Aug
2024

Hackers Hijacked ISP Service Provider To Poison Software Updates

⁤Hackers often attack ISP service providers for several illicit purposes. The most significant ones are disrupting internet services, stealing sensitive…