Man Faces 20 Years in Prison for First-Ever AI Music Streaming Scam
10
Sep
2024

Man Faces 20 Years in Prison for First-Ever AI Music Streaming Scam

A North Carolina man has been arrested in the first criminal case involving AI-generated music streaming fraud. Accused of using…

10
Sep
2024

CISA confirms that SonicWall vulnerability is getting exploited (CVE-2024-40766)

The US Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2024-40766 – a recently fixed improper access control vulnerability affecting…

Cyberattacks in Southeast Asia
10
Sep
2024

Experts Identify 3 Chinese-Linked Clusters Behind Cyberattacks in Southeast Asia

Sep 10, 2024Ravie LakshmananMalware / Cyber Espionage A trio of threat activity clusters linked to China has been observed compromising…

WhatsApp's View Once
10
Sep
2024

WhatsApp’s “View Once” Bug Lets Hackers Save Messages

Researchers have found a critical flaw in WhatsApp’s “View Once” feature that was found to be actively exploited by threat…

Poland thwarted cyberattacks that were carried out by Russia and Belarus
10
Sep
2024

Poland thwarted cyberattacks that were carried out by Russia and Belarus

Poland thwarted cyberattacks that were carried out by Russia and Belarus Pierluigi Paganini September 10, 2024 Poland ‘s security officials…

CISA Warns of Three Vulnerabilities That Are Actively Exploited in the Wild
10
Sep
2024

CISA Warns of Three Vulnerabilities That Are Actively Exploited in the Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, warning that…

Shadow Apps
10
Sep
2024

The Invisible Gateway to SaaS Data Breaches

Shadow apps, a segment of Shadow IT, are SaaS applications purchased without the knowledge of the security team. While these…

What is Asymmetric Cryptography?
10
Sep
2024

What is Asymmetric Cryptography?

Asymmetric cryptography, or public key cryptography, is a cornerstone of modern digital security. It plays a crucial role in ensuring…

Malicious Chrome Extension That Delivers Weaponized ZIP Archive
10
Sep
2024

Malicious Chrome Extension That Delivers Weaponized ZIP Archive

In August 2024, researchers detected a malicious Google Chrome browser infection that led to the distribution of LummaC2 stealer malware…

How can organisations improve threat intelligence collaboration?
10
Sep
2024

How can organisations improve threat intelligence collaboration?

Among the various factors that contribute to an effective security strategy, threat intelligence collaboration and information sharing play a crucial…

NoName ransomware gang deploying RansomHub malware in recent attacks
10
Sep
2024

NoName ransomware gang deploying RansomHub malware in recent attacks

The NoName ransomware gang has been trying to build a reputation for more than three years targeting small and medium-sized businesses…

Earth Preta Hackers Added New Tools To Their Arsenal
10
Sep
2024

Earth Preta Hackers Added New Tools To Their Arsenal

Earth Preta, also known as Mustang Panda, Bronze President, RedDelta, and Red Lich, is a sophisticated Chinese APT group that…