CYBER

Clearview AI was fined €30.5 million ($33.7 million) by the Dutch Data Protection Authority (Dutch DPA) for breaking the General Data Protection Regulation (GDPR) in the European Union (EU) by creating an “illegal database with...

Palo Alto warns that threat actors are spoofing GlobalProtect VPN software and delivering malicious payloads to individuals who trust Google Search’s first results. This is a shift from traditional phishing assaults. In June 2024, security...

The Federal Trade Commission (FTC) is set to fine the security camera organization Verkada $2.95 million for different violations, including its failure to carry out appropriate safety efforts – one of which permitted hackers to...

Telegram CEO Pavel Durov has been released from police custody by French prosecutors after four days of questioning related to allegations that the messaging platform is being used for illegal activities. Durov was arrested on...

Cybersecurity researchers have uncovered new network infrastructure set up by Iranian threat actors to help exercises connected to the new targeting of U.S. political campaigns. Recorded Future’s Insikt Gathering has connected the framework to a...

French prosecutors on Wednesday formally charged Telegram CEO Pavel Durov with facilitating a litany of criminal activity on the popular messaging platform was also barred from leaving the country and placed him under formal investigation...

Once more Cybersecurity researchers are pointing out another QR code phishing (otherwise known as quishing) effort that use Microsoft Sway infrastructure to host fake pages, once again highlighting the abuse of legitimate cloud offerings for...

Close to a third (31%) of worldwide organizations suffered a breach of data in their SaaS applications last year, as they battled to gain visibility and control over their cloud environment, as per AppOmni. For...

In response to the botched CrowdStrike update that shut down 8.5 million Windows-powered computers in July, it was announced by Microsoft that a security summit would be hosted next month in Washington to go over...

Cybersecurity researchers have revealed another data stealer that is intended to target Apple macOS hosts and collect an extensive variety of data, highlighting how threat actors are increasingly setting their sights on the operating system....

Millions of WordPress sites have been potentially exposed to severe security risks due to the identification of a critical vulnerability in the LiteSpeed Cache plugin. LiteSpeed Cache is open-source and the most popular WordPress site...

OpenAI and Condé Nast, the company behind publications like Vogue, The New Yorker, Vanity Fair, and Wired, have announced a “multi-year” partnership to spread its content. Conde Nast is the latest media company to sign...

Warnings are being issued by cybersecurity researchers about the discovery of thousands of externally-facing Oracle NetSuite e-commerce sites that have been found susceptible to leaking sensitive customer information. AppOmni’s Aaron Costello said,”A potential issue in...

A major cryptocurrency company has admitted that a threat actor removed access to its employees’ corporate productivity apps for four days. The official cryptocurrency of the reality television show Unicorn Hunters is Unicoin, which claims...

DigiCert, a digital trust provider, announced its definitive agreement to acquire Vercara from Golden Gate Capital and GIC. Expected to close later this year, the acquisition will enable DigiCert to combine a DNS-based service with...

New stealer malware that is designed to specifically target Apple macOS systems has been uncovered by cybersecurity researchers. It is available for purchase in the underground of cybercrime and is known as Banshee Stealer. It...

Associations are presenting more than 300 new services every month, adding to almost 32% of high or critical cloud exposures, according to a new report by Palo Alto Organizations’ Unit 42. This fast extension of...

A new malware campaign targeting government entities with emails masquerading to be from the Security Service of Ukraine is being warned of by Ukrainian authorities. On August 12th, it was noticed by the Computer Emergency...

The multimillion dollar challenge is attempting to harness artificial intelligence to convey significant additions in cybersecurity. LAS VEGAS — The Pentagon is one bit nearer to building independent mechanics that can find and fix weaknesses...

Microsoft has made public zero-day vulnerability in Office that has not been patched, and if it is successfully exploited, it could enable malicious actors to gain unauthorized access to sensitive information. The vulnerability, tracked as...

Critical details about the North Korean advanced persistent threat (APT) group Kimsuky have been uncovered by cybersecurity analysts, which have been targeting universities as part of its global espionage operations. Kimsuky, which has been operating...

The CrowdStrike-linked outage is called a ‘dress rehearsal’ for what may have been planned for U.S. critical infrastructure by the CISA director. LAS VEGAS — the faulty CrowdStrike Falcon update that made large number of...

INTERPOL said it contrived a “global stop-payment mechanism” that worked with the biggest ever recuperation of assets cheated in a business email compromise (BEC) scam. The improvement comes after an anonymous item firm situated in...

Consumers were conned out of at least $213 million by “scammers behind a sprawling credit repair pyramid scheme,” according to the US Federal Trade Commission (FTC). They will now “end practices” and pay $12 million,...

A new level of sophistication associated with the threat actor Evasive Panda, which is linked to China, compromised an unidentified internet service provider (ISP) to distribute malicious software updates to target businesses in the middle...

A lawsuit was filed against the well-known video-sharing platform TikTok by the Federal Trade Commission (FTC) and the U.S. Department of Justice (DoJ) for “flagrantly violating” the country’s laws regarding the privacy of children. According...

Widespread phishing campaigns targeting small and medium-sized businesses (SMBs) in Poland during May 2024 have been detailed by cybersecurity researchers, which led to the deployment of several malware families like Agent Tesla, Formbook, and Remcos...

A supply chain breach that compromised the personal and banking information of thousands of its customers has been revealed by a cryptocurrency exchange with headquarters in the United States. Breach warning letters from Gemini were...

Pathology services supplier Synnovis has modified “significant parts” of its systems since the ransomware attack on June 3, 2024, restoring critical blood supplies to NHS hospitals. Despite this, the NHS gave an alarm over blood...

An indictment against a North Korean military intelligence agent was unsealed by the U.S. Department of Justice (DoJ) on Thursday for allegedly orchestrating additional intrusions into defense, technology, and government organizations worldwide through ransomware attacks...

Information stored in U.S. government nuclear facilities and research institutions, as well as missile systems, uranium processing, and other R&D intel, has been targeted by the group now known as APT45. Efforts are being actively...

The malicious activity is being observed as CrowdStrike customers continue to recover from the July 18 outage. Cybercriminals and hacktivists are taking advantage of the situation with newly registered domains, malware attached to files with...

A new Linux variant of a ransomware strain known as Play (also known as Balloonfly and PlayCrypt) that is targeted at VMware ESXi environments has been discovered by cybersecurity researchers. In a report that was...

Microsoft products have been impacted by a flaw in CrowdStrike software, with malfunctions resulting in problems for government services. The outage at Microsoft that was caused by CrowdStrike, a software company, has had an impact...

The Nigeria-based international cyber gang was taken down, and millions in seized assets and hundreds of blocked bank accounts were involved. Interpol said Wednesday that an international law enforcement operation targeting the sprawling West African...

Security specialists have revealed basic remote code execution (RCE) vulnerability, distinguished as CVE-2024-38112, within the MHTML protocol handler. This vulnerability named ZDI-CAN-24433, was accounted for from CVE-2024-38112 to Microsoft upon revelation (and later fixed by...

An activist hacking group claimed it leaked thousands of Disney’s internal messaging channels, which included data about unreleased projects, raw images PC codes and some logins. Nullbulge, the “hacktivist group,” claimed responsibility for the breach...

It is said by researchers that the wallets that received the large bitcoin payment are tied to BlackSuit affiliates. The ransomware group connected to a June cyberattack against auto industry programming supplier CDK Global got...

The company’s Snowflake instance was used to take the pilfered content, which contains aggregated metadata. Telecommunications giant AT&T declared Friday that hackers got a half year of telephone and text message records of “nearly all”...

Tens of thousands of user documents, including passports, driving licenses, certificates, and other personal information uploaded by users, have been leaked by two online PDF makers Everyone has been there: incredibly hurried, battling to quickly...

Never Miss An Update
Never miss any important news. Subscribe to our newsletter.
Latest News

Subscribe to our newsletter

Sign up for newsletter and receive exclusive cyber news regularly