The Fédération Française de Football (FFF) has been informed of allegations regarding a potential security breach within their systems. The French Football Federation (FFF) is the governing body of football in France. It oversees the operations and organization of French football leagues and national teams. The FFF supports players, clubs, and volunteers nationwide and is committed to … [Read more...]
Hackers Exploited Ubuntu, Adobe Reader, Sharepoint, Tesla ECU & Oracle VM
This year’s Pwn2Own Vancouver 2024 event is expected to be the largest in Vancouver history, both in terms of entries and potential rewards. The event’s victors will receive over $1,300,000 in cash and prizes, which include a Tesla Model 3. The results of Pwn2Own Vancouver 2024’s first day have been released, and the hackers particularly hacked Oracle VM, Adobe Reader, Microsoft Sharepoint, … [Read more...]
Taxpayers Beware: Hackers Unleash Clever Tactics in Latest Cyber Attacks
As tax season rolls around, a period marked by the rush to meet filing deadlines and ensure compliance with tax laws, cybercriminals are ramping up their efforts to exploit this busy time. Leveraging sophisticated social engineering tactics, these threat actors launch targeted campaigns to deceive taxpayers into divulging sensitive information, making payments for fraudulent services, or … [Read more...]
AttackGen : AI-Based Incident Response Tool With MITRE ATT&CK Framework
In the ever-evolving landscape of cybersecurity, the need for advanced tools to simulate and test incident response is critical. AttackGen, a cutting-edge incident response testing tool, has emerged as a game-changer in this domain. Leveraging the power of large language models and the comprehensive MITRE ATT&CK framework, AttackGen offers a unique approach to preparing organizations … [Read more...]
New Application-Layer Loop DoS Attack: Impacts 300,000 Online Systems
Cybersecurity researchers have identified a new form of denial-of-service (DoS) attack that could disrupt over 300,000 internet-connected systems worldwide. This novel attack, which targets the application layer of network communication, has raised significant concerns due to its self-perpetuating nature and the ease with which it can be executed. Attack Description and Impact The newly … [Read more...]
New GitHub AI-Powered Tool Can Automatically Fix Code Vulnerabilities
In a groundbreaking move to enhance code security, GitHub has announced the launch of a new feature called “code scanning autofix,” which leverages the power of GitHub Copilot and CodeQL to resolve code vulnerabilities automatically. This innovative tool is designed to streamline the process of identifying and fixing security issues within codebases, marking a significant step forward in … [Read more...]
Hackers Group TOXINBIO Recruiting New Members After Law Enforcement Crackdown
The notorious ransomware group known as TOXINBIO has intensified its recruitment efforts following a significant disruption by international law enforcement agencies. This development comes in the wake of a coordinated crackdown that targeted the group’s operations, leading to arrests and the seizure of critical infrastructure. However, far from being deterred, TOXINBIO appears to be … [Read more...]
Flipper Devices Inc. Responds to Canadian Ban on Flipper Zero
Flipper Devices Inc., the company behind the multifunctional Flipper Zero tool, has formally responded to the Canadian government’s decision to ban the device. The Canadian authorities have classified the Flipper Zero as a potential tool for cybercrime, leading to its prohibition within the country. The Canadian government has scrutinized the Flipper Zero, a compact gadget designed for … [Read more...]
Operation PhantomBlu: Attackers Utilising Weaponized MS Office Doc to Hack Windows
Researchers from Perception Point identified a new malware campaign, PhantomBlu, targeting US organizations that use novel techniques to deploy NetSupport RAT, a remote access trojan, by exploiting legitimate features of Microsoft Office document templates via OLE manipulation. It allows the attackers to evade detection and gain control of victim machines for various malicious activities, … [Read more...]
Hackers Attacking Critical US Water Systems, White House Warns
Hackers target important water systems for various purposes in such a way as it can compromise the systems to alter its quality, interrupt supply, or even potentially put public health at risk. All these things show the weakness of critical infrastructure to cyber-attacks. Recently, the White House office warned that hackers are actively attacking critical US water systems. U.S. water … [Read more...]
Ukraine Hacker Arrested For Selling 100M+ Internet Users Data
Three individuals stand accused of leading a large-scale hacking operation targeting email and Instagram accounts, potentially involving over 100 million users worldwide. Ukrainian law enforcement officials, in collaboration with investigators from the Kharkiv region, apprehended three suspects – aged 20 to 40 – believed to be responsible for hacking email and Instagram accounts. The … [Read more...]
Chrome 123: Patch for 12 Security Vulnerabilities
The Chrome team has proudly announced that Chrome 123 has been promoted to the stable channel for users on Windows, Mac, and Linux. This latest version, Chrome 123.0.6312.58 for Linux and 123.0.6312.58/.59 for Windows and Mac, is set to roll out progressively over the next few days and weeks. It encompasses a slew of fixes and improvements aimed at enhancing user experience and … [Read more...]
Microsoft Notifies DevOps Teams That Major Domain Change Is Coming
Microsoft is unifying its cloud domain for Microsoft 365 services under “cloud.microsoft” to streamline the user experience and administration, which aims to reduce domain fragmentation for authenticated user-facing apps and services. The consolidation will enhance security, simplify administration with consistent allow-lists, and pave the way for tighter integration across the entire … [Read more...]
Smoke Loader Attacking Financial Institutions Running Microsoft Windows
The reason hackers go after financial institutions is because these places have valuable things like money, intellectual property, and sensitive customer information. Hacked financial systems can result in monetary gain by means of theft, blackmail or disservice interruption. Cybersecurity researchers at Palo Alto Networks recently discovered that Smoke Loader malware has been … [Read more...]
Researchers Detailed Red Teaming Malicious Use Cases For AI
Researchers investigated potential malicious uses of AI by threat actors and experimented with various AI models, including large language models, multimodal image models, and text-to-speech models. Importantly, they did not fine-tune or provide additional training to the models, simulating the resources threat actors might have access to and suggesting that in 2024, the most likely … [Read more...]
Broadcom’s CEO Showcases VMware’s initial 100-day Achievements
VMware has completed its first 100 days under Broadcom’s wing, beginning a transformative journey toward becoming the world’s leading infrastructure technology company. This period has seen substantial progress, with strategic changes to enhance customer value, simplify operations, and foster innovation. A Strategic Overhaul for Enhanced Customer Value Broadcom’s acquisition of VMware … [Read more...]
What does ‘AI Washing’ mean? Firms Fined $400K by SEC for Exaggerated Statements
The Securities and Exchange Commission (SEC) has fined two investment advisers, Delphia (USA) Inc. and Global Predictions Inc., $400,000 for making false and misleading claims about their use of artificial intelligence (AI). This action underscores the regulatory body’s commitment to ensuring transparency and honesty in the burgeoning field of AI in finance. Here’s a closer look at the case and … [Read more...]
US Welcomes Other Countries to Join Fight Against Spyware
A coalition of democratic nations has come together to address the growing threat posed by the misuse of commercial spyware. The United States and 17 other countries have issued a joint statement recognizing the need for stringent controls to prevent the proliferation and misuse of such technology. The International Coalition Against Spyware The coalition includes Australia, Canada, … [Read more...]
CISA, NSA & FBI Warns of Volt Typhoon Attacking Targeting Critical Infrastructure
Cybersecurity and Infrastructure Security Agency (CISA), along with the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), and international partners, have issued a stark warning about a sophisticated cyber threat group known as “Volt Typhoon.” This group, backed by the People’s Republic of China (PRC), has been actively pre-positioning itself within the networks of … [Read more...]
Hackers Advertising GlorySprout Stealer On Popular Hacking Forums
Hackers use stealers to gather sensitive information, for example, login credentials, financial data, or personal details from victims’ devices. These stolen credentials can be employed in countless nefarious acts such as identity theft, financial fraud, or account hacking. RussianPanda recently discovered that hackers are actively advertising GlorySprout Stealer on popular hacking … [Read more...]
- « Previous Page
- 1
- …
- 14
- 15
- 16
- 17
- 18
- …
- 84
- Next Page »