Fake Meeting Software
19
Jun
2024

Markopolo’s Scam Targeting Crypto Users via Fake Meeting Software

Jun 19, 2024NewsroomCybercrime / Cryptocurrency A threat actor who goes by alias markopolo has been identified as behind a large-scale…

Stuxnet Malware Air-Gapped Networks
19
Jun
2024

New PhaaS Platform Let Attackers Bypass 2FA Mechanism

Several phishing campaign kits have been used widely by threat actors in the past. One popular PhaaS (Phishing-as-a-Platform) was Caffeine,…

Security Nightmare
19
Jun
2024

Unmanaged GTM Tags Become a Security Nightmare

Jun 19, 2024The Hacker NewsGDPR Compliance / Data Privacy Are your tags really safe with Google Tag Manager? If you’ve…

Google Chrome Patches Six High-Severity Vulnerabilities
19
Jun
2024

Google Chrome Patches Six High-Severity Vulnerabilities

Google has released a critical security update for its Chrome browser, addressing six high-severity vulnerabilities that could potentially lead to…

IntelBroker Hacker Claims Apple Breach, Steals Source Code for Internal Tools
19
Jun
2024

IntelBroker Hacker Claims Apple Breach, Steals Source Code for Internal Tools

The notorious IntelBroker hacker, who has previously been linked to high-profile breaches of major companies and government entities, has claimed…

Clever macOS malware delivery campaign targets cryptocurrency users
19
Jun
2024

Clever macOS malware delivery campaign targets cryptocurrency users

Cryptocurrency users are being targeted with legitimate-looking but fake apps that deliver information-stealing malware instead, Recorder Future’s researchers are warning….

Malicious VPN
19
Jun
2024

Void Arachne Uses Deepfakes and AI to Deliver Malicious VPNs to Chinese Users

Jun 19, 2024NewsroomMalware / Cyber Attack Chinese-speaking users are the target of a never-before-seen threat activity cluster codenamed Void Arachne…

Maxicare Data Breach
19
Jun
2024

Maxicare Data Breach: Probe Launched, Impact Limited

Maxicare, one of the leading health maintenance organizations, has reported a security incident involving unauthorized access to personal information. The…

AI-Powered Browsers Detecting Zero-Day Phishing Attacks in High Accuracy
19
Jun
2024

AI-Powered Browsers Detecting Zero-Day Phishing Attacks

Researchers have developed a real-time browser extension integrated with machine learning algorithms to detect phishing websites with remarkable accuracy. This…

This Is What Would Happen if China Invaded Taiwan
19
Jun
2024

This Is What Would Happen if China Invaded Taiwan

In late March, a Taiwanese data analyst posted on social media about an odd satellite image: It appeared that the…

New Study Shows Rapid Adoption
19
Jun
2024

New Study Shows Rapid Adoption

Titania, specialists in continuous network security and compliance assurance solutions, announced the release of compelling new research that highlights a…

ShrinkLocker Uses Windows BitLocker Utility To Infect Computers
19
Jun
2024

ShrinkLocker Uses Windows BitLocker Utility To Infect Computers

Hackers exploit the Windows BitLocker tool, as this utility offers a very powerful tool for selectively encrypting access to the…