FTC
01
Apr
2024

Americans lost $1.1 billion to impersonation scams in 2023

Impersonation scams in the U.S. exceeded $1.1 billion in losses last year, according to statistics collected by the Federal Trade…

Linux Kernel Flaw-Attackers Gain Full Root Access: PoC Published
01
Apr
2024

Linux Kernel Flaw-Attackers Gain Full Root Access: PoC Published

Security researchers have uncovered a critical vulnerability in the Linux kernel’s io_uring subsystem, which could allow attackers to gain full root access…

Backdoor in upstream xz/liblzma Let Attackers Hack SSH Servers
01
Apr
2024

Backdoor in upstream xz/liblzma Let Attackers Hack SSH Servers

A startling revelation has identified a dangerous security vulnerability in the xz compression utility, specifically within its liblzma library. This…

Cyber Attack news headlines trending on Google
01
Apr
2024

Cybersecurity news headlines trending on Google

AT&T Acknowledges Data Breach AT&T, one of America’s leading telecom brands, has confessed to a significant data breach, revealing that…

New Vultur malware version includes enhanced remote control and evasion capabilities
01
Apr
2024

New Vultur malware version includes enhanced remote control and evasion capabilities

New Vultur malware version includes enhanced remote control and evasion capabilities Pierluigi Paganini April 01, 2024 Researchers detected a new…

Shopping platform PandaBuy data leak impacts 1.3 million users
01
Apr
2024

Shopping platform PandaBuy data leak impacts 1.3 million users

Data belonging to more than 1.3 million customers of the PandaBuy online shopping platform has been leaked, allegedly after two…

Vultur Android Malware mimic As McAfee Security App
01
Apr
2024

Vultur Android Malware mimic As McAfee Security App

Vultur, Android banking malware, has been observed incorporating new technical features, which allow the malware operator to remotely communicate with…

Real Time Exposure Detection Is the Missing Element of Every Cybersecurity Strategy
01
Apr
2024

Real Time Exposure Detection Is the Missing Element of Every Cybersecurity Strategy

Detecting threats and vulnerabilities in real-time is crucial for an effective cybersecurity strategy to protect against cybercriminals. By Or Shoshani,…

upstream xz/liblzma
01
Apr
2024

Werewolf Hackers Exploiting WinRAR Vulnerability

Active since 2023, the Mysterious Werewolf cluster has shifted targets to the military-industrial complex (MIC) by using phishing emails with…

Dark Data helps boost business: Unveiling hidden insights
01
Apr
2024

Dark Data helps boost business: Unveiling hidden insights

[by Intellinexus CEO Jacques du Preez]   Businesses are constantly seeking new ways to gain a competitive edge and drive…

Indian Government
01
Apr
2024

Indian Government Rescues 250 Citizens Forced into Cybercrime in Cambodia

Apr 01, 2024NewsroomCryptocurrency / Financial Fraud The Indian government said it has rescued and repatriated about 250 citizens in Cambodia…

What secure coding practices mean to modern cyber security
01
Apr
2024

Security Think Tank: Ransomware lessons from the armed forces

Coming from a military intelligence background, focusing on the financing of terrorist groups, I saw the power of the dollar…