Greek government fined over AI surveillance in refugee camps
09
Apr
2024

Greek government fined over AI surveillance in refugee camps

Greece’s Ministry of Migration and Asylum has received a significant €175,000 fine for violating data and privacy protection regulations in…

Hackers Hijacking Popular YouTube Channels To Deliver IMalware
09
Apr
2024

Hackers Hijacking Popular YouTube Channels To Deliver IMalware

Hackers always end up targeting famous YouTube channels because of their large audience base, and their aim is to exploit…

Top Israeli Spy Chief Identity Exposed In A Privacy Mistake
09
Apr
2024

Top Israeli Spy Chief Identity Exposed In A Privacy Mistake

Privacy mistakes could pose a serious threat to sensitive information or systems,, which threat actors could exploit for their gain….

Multi-Stage Malware via Invoice Phishing
09
Apr
2024

Attackers Using Obfuscation Tools to Deliver Multi-Stage Malware via Invoice Phishing

Apr 09, 2024NewsroomMalware / Cryptojacking Cybersecurity researchers have discovered an intricate multi-stage attack that leverages invoice-themed phishing decoys to deliver…

Two Chinese Developers Over Crypto Investment App Scams
09
Apr
2024

Two Chinese Developers Over Crypto Investment App Scams

A recent lawsuit was filed by Google against two app developers, Yunfeng Sun (also known as Alphonse Sun) and Hongnam…

Google Rolls Out “Find My Device” Network for Android Users
09
Apr
2024

Google Rolls Out “Find My Device” Network for Android Users

Google has announced the global rollout of its revamped Find My Device network. This innovative feature is set to transform…

China is using generative AI to carry out influence operations
09
Apr
2024

China is using generative AI to carry out influence operations

China is using generative AI to carry out influence operations Pierluigi Paganini April 09, 2024 China-linked threat actors are using…

How Penetration Tests Are Classified
09
Apr
2024

Hackers Launch DOS Attacks on Web Servers

Researchers identified a significant vulnerability within the HTTP/2 protocol, potentially allowing hackers to launch Denial of Service (DOS) attacks on…

Ransomware attack news trending on Google
09
Apr
2024

Another ransomware gang reclaims to have hacked United Health

In February of this year, Change Health, a subsidiary of UnitedHealth, made headlines when it fell victim to a sophisticated…

EJBCA: Open-source public key infrastructure (PKI), certificate authority (CA)
09
Apr
2024

EJBCA: Open-source public key infrastructure (PKI), certificate authority (CA)

EJBCA is open-source PKI and CA software. It can handle almost anything, and someone once called it the kitchen sink…

D-Link NAS Devices
09
Apr
2024

Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks

Apr 09, 2024NewsroomBotnet / Vulnerability Threat actors are actively scanning and exploiting a pair of security flaws that are said…

Google Adds V8 Sandbox in Chrome To Stop Memory Corruption Attacks
09
Apr
2024

Google Adds V8 Sandbox in Chrome To Stop Memory Corruption Attacks

In a significant move to bolster the security of its widely-used V8 JavaScript engine, Google has unveiled the V8 Sandbox,…