The Pros and Cons of Bitcoin
05
Aug
2024

The Pros and Cons of Bitcoin

Bitcoin, the first and most popular cryptocurrency, offers high potential returns but comes with high volatility and a lack of…

Rapid7 releases Command Platform, unified attack defense and response
05
Aug
2024

Rapid7 releases Command Platform, unified attack defense and response

Rapid7 launched its Command Platform, a unified threat exposure, detection, and response platform. It allows customers to integrate their critical…

Cyber lessons, and priorities for the UK's new government
05
Aug
2024

Cyber lessons, and priorities for the UK’s new government

The digital and cyber security landscape in the UK is set to undergo significant evolution with the transition to a…

Mirai Botnet Attacking Apache OFBiz Directory Traversal Vulnerability
05
Aug
2024

Mirai Botnet Attacking Apache OFBiz Directory Traversal Vulnerability

The notorious Mirai botnet has been observed exploiting a recently disclosed directory traversal vulnerability in Apache OFBiz. This Java-based framework,…

Cybersecurity Law
05
Aug
2024

How it Impacts Cybersecurity Law

Aug 05, 2024The Hacker NewsCybersecurity Law / Data Privacy The Loper Bright decision has yielded impactful results: the Supreme Court…

Leaked Wallpaper Exploit Let Attackers Escalate Privilege on Windows Systems
05
Aug
2024

Leaked Wallpaper Exploit Let Attackers Escalate Privilege on Windows Systems

A critical security flaw in Windows’ wallpaper handling mechanism has been uncovered. It allows attackers to gain system-level privileges on…

Hackers Infect Windows With Backdoor Malware Via "Car For Sale" Ad
05
Aug
2024

Hackers Infect Windows With Backdoor Malware Via “Car For Sale” Ad

Fighting Ursa, a Russian APT, has employed a car sales phishing lure to distribute the HeadLace backdoor malware targeting diplomats…

Chinese hackers compromised an ISP to deliver malicious software updates
05
Aug
2024

Chinese hackers compromised an ISP to deliver malicious software updates

APT StormBamboo compromised a undisclosed internet service provider (ISP) to poison DNS queries and thus deliver malware to target organizations,…

Children's privacy, Privacy watchdog, ICO, Social Media Platforms, Video-Streaming Platforms
05
Aug
2024

UK Privacy Watchdog Targets Social Media For Children’s Privacy Violations

British regulators are demanding that 11 social media and video-sharing platforms bolster their protections for children’s privacy. The move follows…

APT41 Hackers Attacking Research Institute with ShadowPad and Cobalt Strike
05
Aug
2024

APT41 Attacking Research Institute with ShadowPad & Cobalt Strike

Cisco Talos has unearthed a sophisticated cyber-espionage campaign targeting a Taiwanese government-affiliated research institute. The attack, attributed to the notorious…

How Project 2025 Would Put US Elections at Risk
05
Aug
2024

How Project 2025 Would Put US Elections at Risk

If anything, the military has impinged on CISA’s territory—not the other way around—out of exasperation with the civilian agency’s constrained…

Researchers Details How Hackers Can Steal Passwords via HDMI Cables
05
Aug
2024

Researchers Details How Hackers Can Steal Passwords via HDMI Cables

Security researchers have found a new way for hackers to steal sensitive information like passwords by eavesdropping on HDMI cables….