Zyxel Command Injection Flaws
30
Nov
2023

US Seized Crypto Currency Mixer used by North Korean Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed that the North Korean hacker group…

Cryptocurrency Hacks
30
Nov
2023

North Korea’s Lazarus Group Rakes in $3 Billion from Cryptocurrency Hacks

Nov 30, 2023NewsroomCryptocurrency / Cyberattacks Threat actors from the Democratic People’s Republic of Korea (DPRK) are increasingly targeting the cryptocurrency…

Rhysida gang stole hundreds of gigabytes of British Library data
30
Nov
2023

Rhysida gang stole hundreds of gigabytes of British Library data

The scale of the data breach affecting the British Library in the wake of a Rhysida ransomware attack is now…

Palo Alto Networks OT security firewall
30
Nov
2023

Palo Alto Networks Unveils New Rugged Firewall for Industrial Environments 

Palo Alto Networks on Wednesday unveiled a rugged firewall for industrial environments, and announced several new features available through its…

The CDC's Gun Violence Research Is in Danger
30
Nov
2023

The CDC’s Gun Violence Research Is in Danger

“A lot of new questions are being asked and new ways of looking at things—this just wasn’t possible five years…

Meta logo
30
Nov
2023

Meta sued over forcing users to pay to stop tracking

Meta is required to get users’ consent in Europe in order to show them targeted ads. For this reason, Meta has…

CACTUS Ransomware
30
Nov
2023

CACTUS Ransomware Exploits Qlik Sense Vulnerabilities in Targeted Attacks

Nov 30, 2023NewsroomRansomware / Vulnerability A CACTUS ransomware campaign has been observed exploiting recently disclosed security flaws in a cloud…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
30
Nov
2023

Dollar Tree Impacted by ZeroedIn Data Breach Affecting 2 Million Individuals

Workforce analytics services provider ZeroedIn is notifying roughly two million individuals that their personal information was compromised in an August…

7 Uses for Generative AI to Enhance Security Operations
30
Nov
2023

7 Uses for Generative AI to Enhance Security Operations

Welcome to a world where Generative AI revolutionizes the field of cybersecurity. Generative AI refers to the use of artificial…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
30
Nov
2023

Google’s RETVec Open Source Text Vectorizer Bolsters Malicious Email Detection

Google revealed on Wednesday that a new text vectorizer developed by its researchers significantly boosts efficiency in detecting malicious emails…

Zyxel Command Injection Flaws
30
Nov
2023

CISA Warns Exploitation Wastewater System Logic Controllers

In a disconcerting turn of events, cyber threat actors have set their sights on Unitronics programmable logic controllers (PLCs) embedded…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
30
Nov
2023

CISA Debuts ‘Secure by Design’ Alert Series

The US cybersecurity agency CISA on Wednesday introduced a new type of alerts aimed at underlining the harm caused by…