5 Best Bug Bounty Platforms For Hackers
02
Jan
2024

5 Best Bug Bounty Platforms For Hackers

Bug bounty platforms play a crucial role in the cybersecurity ecosystem by enabling organizations to leverage the expertise of external…

Hackers Attack UK's Nuclear Waste Services Through LinkedIn
02
Jan
2024

Hackers Attack UK’s Nuclear Waste Services Through LinkedIn

Fortunately for Radioactive Waste Management (RWM), the first-of-its-kind hacker attack on the project was unsuccessful. The United Kingdom’s Radioactive Waste…

Incognito Mode Tracking
02
Jan
2024

Google Settles $5 Billion Privacy Lawsuit Over Tracking Users in ‘Incognito Mode’

Jan 02, 2024NewsroomData Privacy / Online Tracking Google has agreed to settle a lawsuit filed in June 2020 that alleged…

Terrapin attack allows to downgrade SSH protocol security
02
Jan
2024

Terrapin attack allows to downgrade SSH protocol security

Terrapin attack allows to downgrade SSH protocol security Pierluigi Paganini January 02, 2024 Researchers discovered an SSH vulnerability, called Terrapin,…

Enterprise Browser
02
Jan
2024

The Definitive Enterprise Browser Buyer’s Guide

Jan 02, 2024The Hacker NewsBrowser Security / Threat Protection Security stakeholders have come to realize that the prominent role the…

Anonymous Sudan Claims Cyberattack On Twitch
02
Jan
2024

Anonymous Sudan Claims Cyberattack On Twitch

The notorious hacktivist group, Anonymous Sudan, is said to have orchestrated a Distributed Denial of Service (DDoS) attack on the…

Aspiration Training Cyberattack
02
Jan
2024

Aspiration Training Cyberattack: Unverified Claims By Rhysida

The Rhysida ransomware group has allegedly claimed an Aspiration Training cyberattack on its dark web portal. Adding the award-winning specialist…

Multiple organizations in Iran breached by a mysterious hacker
02
Jan
2024

Multiple organizations in Iran breached by a mysterious hacker

Multiple organizations in Iran were breached by a mysterious hacker Pierluigi Paganini January 02, 2024 Hudson Researchers reported that a…

10 Most Common Types of Cyber Attacks in 2023
02
Jan
2024

10 Most Common Types of Cyber Attacks in 2023

Cyber attacks are evolving rapidly with advancements in technology, as threat actors exploit new vulnerabilities in:- The rise of the…

Top 10 Notorious Ransomware Gangs of 2023
02
Jan
2024

Top 10 Notorious Ransomware Gangs of 2023

By employing a multitude of advanced techniques like double extortion along with other illicit tactics, ransomware groups are continually evolving…

Zeppelin2 Ransomware Builder Tool Goes On Sale
02
Jan
2024

Zeppelin2 Ransomware Builder Tool Goes On Sale

In a recent development on an underground forum, a user is actively promoting the sale of Zeppelin2 ransomware, offering both…

MPM Medical Supply Cyberattack
02
Jan
2024

CiphBit Ransomware Initiates MPM Medical Supply Cyberattack

The notorious CiphBit ransomware group has claimed another victim, with MPM Medical Supply falling prey to their cyber onslaught. The…