Opera Bug Hackers Run ANY File on Mac or Windows
18
Jan
2024

Opera Bug Hackers Run ANY File on Mac or Windows

Hackers exploit Remote Code Execution (RCE) vulnerabilities as they allow them to execute arbitrary code on a target system remotely….

Webinar
18
Jan
2024

Androxgh0st Botnet Malware Steals AWS, Microsoft Credentials

Threat actors use botnet malware to gain access to the network of compromised systems that enable them to perform several…

Skytrack: Open-source aircraft reconnaissance tool
18
Jan
2024

Skytrack: Open-source aircraft reconnaissance tool

Skytrack is an open-source command-line tool for plane spotting and aircraft OSINT reconnaissance. The tool utilizes multiple data sources to…

Database On Dark Web For $6000
18
Jan
2024

Database On Dark Web For $6000

Ulsan HD FC, formerly known as Ulsan Hyundai FC, a prominent South Korean professional football club based in Ulsan, is…

Snatch Ransomware Group Claims The FDVA Cyber Attack
18
Jan
2024

Cyberattack On Swiss Government Websites By NoName

Swiss government websites were hit by a targeted cyberattack on Wednesday, led by a group known as ‘NoName,’ with ties…

Apple discloses 2 actively exploited zero-days in iPhones, Macs
18
Jan
2024

iShutdown method allows to discover spyware infections on iPhones

iShutdown lightweight method allows to discover spyware infections on iPhones Pierluigi Paganini January 18, 2024 Researchers devised a “lightweight method,”…

Fujitsu issues apology for IT and Data Privacy scandal of UK Post Offices
18
Jan
2024

Fujitsu issues apology for IT and Data Privacy scandal of UK Post Offices

Fujitsu, a Japanese multinational company specializing in software and technology services, has issued an apology in response to the IT…

Attribute-based encryption could spell the end of data compromise
18
Jan
2024

Attribute-based encryption could spell the end of data compromise

The future of data privacy is the end of compromise. With the world producing data at astounding rates, we need…

Iranian Hackers Masquerade as Journalists to Spy on Israel-Hamas War Experts
18
Jan
2024

Iranian Hackers Masquerade as Journalists to Spy on Israel-Hamas War Experts

Jan 18, 2024NewsroomCyber Espionage / Threat Intelligence High-profile individuals working on Middle Eastern affairs at universities and research organizations in…

Snatch Ransomware Group Claims The FDVA Cyber Attack
18
Jan
2024

15 Mn User Records Allegedly On Sale

A threat actor has emerged, asserting the sale of Trello data comprising 15,115,516 unique lines of information. The alleged Trello…

Google to tweak search results to comply with EU tech rules
18
Jan
2024

Google to tweak search results to comply with EU tech rules – Software

Google will tweak online search results to give comparison sites more prominence, the company said, as it outlined efforts to…

Adversaries exploit trends, target popular GenAI apps
18
Jan
2024

Adversaries exploit trends, target popular GenAI apps

More than 10% of enterprise employees access at least one generative AI application every month, compared to just 2% a…