New Windows 10 22H2 beta fixes memory leaks and crashes
Microsoft has released a new Windows 10 22H2 beta (KB5041582) with memory leak and crash fixes for Insiders...
Hackers now use AppDomain Injection to drop CobaltStrike beacons
A wave of attacks that started in July 2024 rely on a less common technique called AppDomain Manager Injection,...
US oil giant Halliburton confirms cyberattack behind systems shutdown
Halliburton, one of the world’s largest providers of services to the energy industry, has confirmed a cyberattack that...
New PEAKLIGHT Dropper Deployed in Attacks Targeting Windows with Malicious Movie Downloads
Cybersecurity researchers have uncovered a never-before-seen dropper that serves as a conduit to launch next-stage malware with the...
Exploring Internet and security trends during the 2024 U.S. Democratic National Convention
The 2024 Democratic National Convention (DNC) wrapped up on Thursday, August 22, in Chicago, Illinois. Since our blog...
Local Networks Go Global When Domain Names Collide
The proliferation of new top-level domains (TLDs) has exacerbated a well-known security weakness: Many organizations set up their...
Russian laundering millions for Lazarus hackers arrested in Argentina
The federal police in Argentina (PFA) have arrested a 29-year-old Russian national in Buenos Aires, who is facing...
Greasy Opal’s CAPTCHA solver still serving cybercrime after 16 years
A developer that researchers now track as Greasy Opal, operating as a seemingly legitimate business, has been fueling...
Chinese firms bypass US export restrictions on AI chips using AWS cloud
Chinese firms are circumventing US export restrictions on advanced technologies by accessing them through cloud services provided by...
Webinar: Experience the Power of a Must-Have All-in-One Cybersecurity Platform
Let’s be honest. The world of cybersecurity feels like a constant war zone. You’re bombarded by threats, scrambling...
Focus on What Matters Most: Exposure Management and Your Attack Surface
Read the full article for key points from Intruder’s VP of Product, Andy Hornegold’s recent talk on exposure...
New Qilin Ransomware Attack Uses VPN Credentials, Steals Chrome Data
The threat actors behind a recently observed Qilin ransomware attack have stolen credentials stored in Google Chrome browsers...
New macOS Malware “Cthulhu Stealer” Targets Apple Users’ Data
Cybersecurity researchers have uncovered a new information stealer that’s designed to target Apple macOS hosts and harvest a...
Latvian Hacker Extradited to U.S. for Role in Karakurt Cybercrime Group
A 33-year-old Latvian national living in Moscow, Russia, has been charged in the U.S. for allegedly stealing data,...
When vets are scarce what can farmers do?
In Vietnam farmers are being encouraged to track the use of antibiotics and monitor disease. Source:: BBC News...
Hackers are exploiting critical bug in LiteSpeed Cache plugin
Hackers have already started to exploit the critical severity vulnerability that affects LiteSpeed Cache, a WordPress plugin used...
Qilin ransomware now steals credentials from Chrome browsers
The Qilin ransomware group has been using a new tactic and deploys a custom stealer to steal account credentials...
Yemen weapons dealers selling machine-guns on X
The traders operate in the capital Sana’a and other areas under control of the Houthis. Source:: BBC News...
CloudFormation simplifies resource discovery and template review in the IaC Generator
Today, AWS CloudFormation announces two new enhancements to the IaC generator, which customers use to create infrastructure-as-code (IaC)...
Amazon Q now provides more details about user subscriptions and associated resources
The Amazon Q Console now provides administrators with greater visibility into how users are utilizing Amazon Q Developer...