Difference between Whale Phishing and Spear Phishing
13
May
2024

Australia Firstmac hit by ransomware and info on Europol Data Breach

Australian financial institution Firstmac recently fell victim to a cyber attack, suspected to be a ransomware variant. The Brisbane-based mortgage…

A Threat-Modeling Framework for Embedded Devices
13
May
2024

A Threat-Modeling Framework for Embedded Devices

May 13, 2024Newsroom The MITRE Corporation has officially made available a new threat-modeling framework called EMB3D for makers of embedded…

Maria 01 rolls out ambitious pan-Europe startup plan
13
May
2024

Maria 01 rolls out ambitious pan-Europe startup plan

Finland’s global reputation as an attractive incubator for early stage technology companies has taken a step forward following the roll-out…

Russian hackers defaced British newspaper websites
13
May
2024

Russian hackers defaced British newspaper websites

Russian hackers defaced local British news sites Pierluigi Paganini May 13, 2024 A group of hackers that defines itself as…

Helsinki
13
May
2024

Helsinki suffers data breach after hackers exploit unpatched flaw

The City of Helsinki is investigating a data breach in its education division, which it discovered in late April 2024,…

Hackers Exploiting MS-SQL Severs To Deploy Mallox Ransomware
13
May
2024

Hackers Exploiting MS-SQL Severs To Deploy Mallox Ransomware

Information such as financial records, customer information, and intellectual property that may be sold on the black web markets is…

Passwordless Authentication Standard FIDO2 Flaw
13
May
2024

Tycoon 2FA Attacking Microsoft 365 AND Google Users To Bypass MFA

Tycoon 2FA, a recently emerged Phishing-as-a-Service (PhaaS) platform, targets Microsoft 365 and Gmail accounts, which leverage an Adversary-in-the-Middle (AitM) technique…

Firstmac
13
May
2024

Largest non-bank lender in Australia warns of a data breach

Firstmac Limited is warning customers that it suffered a data breach a day after the new Embargo cyber-extortion group leaked over…

Python Package Hides Sliver C2 Framework Within PNG File
13
May
2024

Python Package Hides Sliver C2 Framework Within PNG File

An attacker published a malicious package on PyPI named “requests-darwin-lite,” masquerading as a variant of the popular “requests” library, which…

The $2.3 Billion Tornado Cash Case Is a Pivotal Moment for Crypto Privacy
13
May
2024

The $2.3 Billion Tornado Cash Case Is a Pivotal Moment for Crypto Privacy

In the conclusion of that same statement to the court, they point out that under Dutch law the maximum prison…

Passwordless Authentication Standard FIDO2 Flaw
13
May
2024

Scattered Spider Attacking Finance & Insurance Industries

Hackers very frequently target the finance and insurance sectors due to the large volumes of sensitive data that they own….

Criminal IP and Quad9 Collaborate to Exchange Domain and IP Threat Intelligence
13
May
2024

Criminal IP and Quad9 Collaborate to Exchange Domain and IP Threat Intelligence

Torrance, California, May 13th, 2024, CyberNewsWire Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by AI SPERA,…