Clearview AI was fined €30.5 million ($33.7 million) by the Dutch Data Protection Authority (Dutch DPA) for breaking the General Data Protection Regulation (GDPR) in the European Union (EU) by creating an “illegal database with...
Palo Alto warns that threat actors are spoofing GlobalProtect VPN software and delivering malicious payloads to individuals who trust Google Search’s first results. This is a shift from traditional phishing assaults. In June 2024, security...
The Federal Trade Commission (FTC) is set to fine the security camera organization Verkada $2.95 million for different violations, including its failure to carry out appropriate safety efforts – one of which permitted hackers to...
How Rant Rooms is Redefining Emotional Expression In today’s fast-paced digital age, the need for a space to express raw, unfiltered emotions has never been greater. Enter Rant Rooms, a platform that provides users an...
Telegram CEO Pavel Durov has been released from police custody by French prosecutors after four days of questioning related to allegations that the messaging platform is being used for illegal activities. Durov was arrested on...
Cybersecurity researchers have uncovered new network infrastructure set up by Iranian threat actors to help exercises connected to the new targeting of U.S. political campaigns. Recorded Future’s Insikt Gathering has connected the framework to a...
French prosecutors on Wednesday formally charged Telegram CEO Pavel Durov with facilitating a litany of criminal activity on the popular messaging platform was also barred from leaving the country and placed him under formal investigation...
Once more Cybersecurity researchers are pointing out another QR code phishing (otherwise known as quishing) effort that use Microsoft Sway infrastructure to host fake pages, once again highlighting the abuse of legitimate cloud offerings for...
Close to a third (31%) of worldwide organizations suffered a breach of data in their SaaS applications last year, as they battled to gain visibility and control over their cloud environment, as per AppOmni. For...
In response to the botched CrowdStrike update that shut down 8.5 million Windows-powered computers in July, it was announced by Microsoft that a security summit would be hosted next month in Washington to go over...
Cybersecurity researchers have revealed another data stealer that is intended to target Apple macOS hosts and collect an extensive variety of data, highlighting how threat actors are increasingly setting their sights on the operating system....
Millions of WordPress sites have been potentially exposed to severe security risks due to the identification of a critical vulnerability in the LiteSpeed Cache plugin. LiteSpeed Cache is open-source and the most popular WordPress site...
OpenAI and Condé Nast, the company behind publications like Vogue, The New Yorker, Vanity Fair, and Wired, have announced a “multi-year” partnership to spread its content. Conde Nast is the latest media company to sign...
Warnings are being issued by cybersecurity researchers about the discovery of thousands of externally-facing Oracle NetSuite e-commerce sites that have been found susceptible to leaking sensitive customer information. AppOmni’s Aaron Costello said,”A potential issue in...
A major cryptocurrency company has admitted that a threat actor removed access to its employees’ corporate productivity apps for four days. The official cryptocurrency of the reality television show Unicorn Hunters is Unicoin, which claims...
DigiCert, a digital trust provider, announced its definitive agreement to acquire Vercara from Golden Gate Capital and GIC. Expected to close later this year, the acquisition will enable DigiCert to combine a DNS-based service with...
New stealer malware that is designed to specifically target Apple macOS systems has been uncovered by cybersecurity researchers. It is available for purchase in the underground of cybercrime and is known as Banshee Stealer. It...
Associations are presenting more than 300 new services every month, adding to almost 32% of high or critical cloud exposures, according to a new report by Palo Alto Organizations’ Unit 42. This fast extension of...
A new malware campaign targeting government entities with emails masquerading to be from the Security Service of Ukraine is being warned of by Ukrainian authorities. On August 12th, it was noticed by the Computer Emergency...
The multimillion dollar challenge is attempting to harness artificial intelligence to convey significant additions in cybersecurity. LAS VEGAS — The Pentagon is one bit nearer to building independent mechanics that can find and fix weaknesses...
After being accused of evading the Kremlin’s technology export controls, a dual citizen of Germany and Russia appeared for the first time in a US court. Arthur Petrov, 33, was removed from Cyprus subsequent to...
Microsoft has made public zero-day vulnerability in Office that has not been patched, and if it is successfully exploited, it could enable malicious actors to gain unauthorized access to sensitive information. The vulnerability, tracked as...
Critical details about the North Korean advanced persistent threat (APT) group Kimsuky have been uncovered by cybersecurity analysts, which have been targeting universities as part of its global espionage operations. Kimsuky, which has been operating...
The CrowdStrike-linked outage is called a ‘dress rehearsal’ for what may have been planned for U.S. critical infrastructure by the CISA director. LAS VEGAS — the faulty CrowdStrike Falcon update that made large number of...
INTERPOL said it contrived a “global stop-payment mechanism” that worked with the biggest ever recuperation of assets cheated in a business email compromise (BEC) scam. The improvement comes after an anonymous item firm situated in...
Consumers were conned out of at least $213 million by “scammers behind a sprawling credit repair pyramid scheme,” according to the US Federal Trade Commission (FTC). They will now “end practices” and pay $12 million,...
A new level of sophistication associated with the threat actor Evasive Panda, which is linked to China, compromised an unidentified internet service provider (ISP) to distribute malicious software updates to target businesses in the middle...
A lawsuit was filed against the well-known video-sharing platform TikTok by the Federal Trade Commission (FTC) and the U.S. Department of Justice (DoJ) for “flagrantly violating” the country’s laws regarding the privacy of children. According...
The scam platform behind 1.8 million fraudulent calls, Russian Coms, has been shut down by the UK’s National Crime Agency (NCA). Russian Coms was laid out in 2021 and is believed to be behind financial...
A sophisticated information-stealing fraud network that lures victims to fake web shops via malicious Facebook ads has been uncovered by security researchers. Dubbed “Eriakos” after the content delivery network (CDN) used by the threat actor,...
A global outage of Microsoft services was started by a Distributed Denial-of-Service (DDoS) attack, the tech giant has revealed. A blunder in Microsoft’s DDoS security estimates then, at that point, enhanced the effect of the...
Widespread phishing campaigns targeting small and medium-sized businesses (SMBs) in Poland during May 2024 have been detailed by cybersecurity researchers, which led to the deployment of several malware families like Agent Tesla, Formbook, and Remcos...
A supply chain breach that compromised the personal and banking information of thousands of its customers has been revealed by a cryptocurrency exchange with headquarters in the United States. Breach warning letters from Gemini were...
Pathology services supplier Synnovis has modified “significant parts” of its systems since the ransomware attack on June 3, 2024, restoring critical blood supplies to NHS hospitals. Despite this, the NHS gave an alarm over blood...
An indictment against a North Korean military intelligence agent was unsealed by the U.S. Department of Justice (DoJ) on Thursday for allegedly orchestrating additional intrusions into defense, technology, and government organizations worldwide through ransomware attacks...
Information stored in U.S. government nuclear facilities and research institutions, as well as missile systems, uranium processing, and other R&D intel, has been targeted by the group now known as APT45. Efforts are being actively...
The malicious activity is being observed as CrowdStrike customers continue to recover from the July 18 outage. Cybercriminals and hacktivists are taking advantage of the situation with newly registered domains, malware attached to files with...
After three of its members were arrested by Spanish authorities over the weekend Pro-Russian hacktivist group NoName(057) unleashes a wave of attacks against Spain. Spanish police declared thearrest s on Saturday, blaming the three suspects...
/*! elementor – v3.22.0 – 26-06-2024 */ .elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=”.svg”]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block} California state Senator Scott Wiener, known for his continuous work on housing and public safety, has introduced a landmark bill aimed at regulating...
A new Linux variant of a ransomware strain known as Play (also known as Balloonfly and PlayCrypt) that is targeted at VMware ESXi environments has been discovered by cybersecurity researchers. In a report that was...
DNFA Investments
Sign up for newsletter and receive exclusive cyber news regularly