iPhone
25
Jan
2024

iPhone apps abuse iOS push notifications to collect user data

Numerous iOS apps are using background processes triggered by push notifications to collect user data about devices, potentially allowing the…

Chrome Flaw Let Attacker Corrupt Memory via Crafted HTML Page
25
Jan
2024

Chrome Flaw Let Attacker Corrupt Memory via Crafted HTML Page

Google has updated the Stable channels to 121.0.6167.85 for Mac and Linux and 121.0.6167.85/.86 for Windows as part of a…

Pure Malware Tools Masquerade As Legitimate Software to Bypass Detections
25
Jan
2024

Pure Malware Tools Masquerade As Legitimate Software to Bypass Detections

An extensive examination of the growing danger posed by the Pure malware family has been released, providing the industry with…

Powerloom to Hold First Ever Node Mint on Polygon Network
25
Jan
2024

Powerloom to Hold First Ever Node Mint on Polygon Network

Powerloom, the composable data network, has just announced a partnership with Polygon Network. In a first-of-its-kind event on Polygon, Powerloom…

Headlines Trending on Google Regarding Recent Cyber Attacks
25
Jan
2024

Headlines Trending on Google Regarding Recent Cyber Attacks

Kansas City Area Transportation Authority Faces Ransomware Attack on IT Infrastructure The Kansas City Area Transportation Authority (KCATA) has fallen…

25
Jan
2024

1Kosmos BlockID 1Key secures users in restricted environments

1Kosmos announced BlockID 1Key, a biometric security key to provide a phishing-resistant passwordless multi-factor authentication option for Sensitive Compartmented Information…

Datacentres set to consume third of Ireland’s energy by 2026
25
Jan
2024

Datacentres set to consume third of Ireland’s energy by 2026

One-third of Ireland’s energy will be used to power datacentres by 2026, claims a 170-page report by the International Energy…

[tl;dr sec] #215 - Cloud Threat Landscape, Web LLM Security Labs, Azure Logs Primer
25
Jan
2024

[tl;dr sec] #215 – Cloud Threat Landscape, Web LLM Security Labs, Azure Logs Primer

I hope you’ve been doing well! 🐕️ Dogn’t You Dare Last week, I shared that recently I slid on something…

Pwn2Own Automotive Tokyo
25
Jan
2024

Tesla hacked again, 24 more zero-days exploited at Pwn2Own Tokyo

Security researchers hacked the Tesla infotainment system and demoed 24 more zero-days on the second day of the Pwn2Own Automotive…

Researchers Awarded Over $1 Million in Pwn2Own Hacking Competition
25
Jan
2024

Researchers Awarded Over $1 Million in Pwn2Own Hacking Competition

At Pwn2Own Automotive 2024 Day 2, researchers were rewarded over $1 million for exploiting Tesla infotainment systems, Sony, Alphine players, Autel charging systems,…

REVIEW OF THE ISC2 CISSP CERTIFICATION
25
Jan
2024

REVIEW OF THE ISC2 CISSP CERTIFICATION

As companies increasingly embrace digital transformation, the cybersecurity threat environment constantly evolves. However, there is a notable shortage of skilled…

25
Jan
2024

Searchlight Cyber adds AI-powered language translation to simplify dark web investigations

Searchlight Cyber has added AI-powered language translation into its dark web investigation and monitoring products DarkIQ and Cerberus. This enhancement…