TA422 Hackers Attack Organizations
09
Dec
2023

Star Blizzard New Evasion Techniques to Hijack Email Accounts

Hackers target email accounts because they contain valuable personal and financial information. Successful email breaches enable threat actors to:- Cybersecurity…

Hospital cyberattack
09
Dec
2023

Norton Healthcare discloses data breach after May ransomware attack

Kentucky health system Norton Healthcare has confirmed that a ransomware attack in May exposed personal information belonging to patients, employees,…

Digital Footprints – An Asset Or A Trap For The Cybercrime Investigator?
09
Dec
2023

Digital Footprints – An Asset Or A Trap For The Cybercrime Investigator?

08 Dec Digital Footprints – An Asset Or A Trap For The Cybercrime Investigator? Posted at 16:52h in Uncategorized by…

Google Drive
08
Dec
2023

Google shares “fix” for deleted Google Drive files

Google says it identified and fixed a bug causing customer files added to Google Drive after April-May 2023 to disappear….

BlackCat Munchkin
08
Dec
2023

ALPHV ransomware site outage rumored to be caused by law enforcement

A law enforcement operation is rumored to be behind an outage affecting ALPHV ransomware gang’s websites over the last 30…

Outlook
08
Dec
2023

Outlook email sending issues for users with lots of folders

Microsoft has acknowledged a new issue affecting Outlook for Microsoft 365 users and causing email-sending problems for those with too…

purple Llama
08
Dec
2023

Meta’s Purple Llama wants to test safety risks in AI models

Meta has announced Purple Llama, a project that aims to “bring together tools and evaluations to help the community build…

5G Modems Flaws
08
Dec
2023

New 5G Modems Flaws Affect iOS Devices and Android Models from Major Brands

Dec 08, 2023NewsroomVulnerability / Mobile Network A collection of security flaws in the firmware implementation of 5G mobile network modems…

Hacker in a datacenter
08
Dec
2023

Privilege elevation exploits used in over 50% of insider attacks

Elevation of privilege flaws are the most common vulnerability leveraged by corporate insiders when conducting unauthorized activities on networks, whether…

Amazon
08
Dec
2023

Amazon sues REKK fraud gang that stole millions in illicit refunds

Amazon’s Customer Protection and Enforcement team has taken legal action against an underground store refund scheme that has resulted in…

Cyber Attack on NATO and Ransomware Attack on Motel One
08
Dec
2023

Microsoft to offer glass based storage tech that is ransomware proof

Microsoft is actively engaged in the development of a glass-based data storage medium slated for integration into its data centers…

Bypassing major EDRs using Pool Party process injection techniques
08
Dec
2023

Bypassing major EDRs using Pool Party process injection techniques

Bypassing major EDRs using Pool Party process injection techniques Pierluigi Paganini December 08, 2023 Researchers devised a novel attack vector…