Windows infected with backdoored Linux VMs in new phishing attacks
A new phishing campaign dubbed ‘CRON#TRAP’ infects Windows with a Linux virtual machine that contains a built-in backdoor...
Phishing campaign infects Windows with backdoored Linux VMs
A new phishing campaign dubbed ‘CRON#TRAP’ infects Windows with a Linux virtual machine that contains a built-in backdoor...
Solving the painful password problem with better policies
Weak and reused credentials continue to plague users and organizations. Learn from Specops software about why passwords are...
City of Columbus: Data of 500,000 stolen in July ransomware attack
The City of Columbus, Ohio, notified 500,000 individuals that a ransomware gang stole their personal and financial information...
Critical Flaws in Ollama AI Framework Could Enable DoS, Model Theft, and Poisoning
Cybersecurity researchers have disclosed six security flaws in the Ollama artificial intelligence (AI) framework that could be exploited...
Microsoft confirms Windows Server 2025 blue screen, install issues
Microsoft has confirmed several bugs causing install and Blue Screen of Death (BSOD) issues impacting Windows Server 2025...
German Police Disrupt DDoS-for-Hire Platform dstat[.]cc; Suspects Arrested
German law enforcement authorities have announced the disruption of a criminal service called dstat[.]cc that made it possible...
THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28 – Nov 03)
This week was a total digital dumpster fire! Hackers were like, “Let’s cause some chaos!” and went after...
Cyber Threats That Could Impact the Retail Industry This Holiday Season (and What to Do About It)
As the holiday season approaches, retail businesses are gearing up for their annual surge in online (and in-store)...
Google’s AI Tool Big Sleep Finds Zero-Day Vulnerability in SQLite Database Engine
Google said it discovered a zero-day vulnerability in the SQLite open-source database engine using its large language model...
Buyer’s guide: Data protection for hybrid clouds
Data protection is a broad category that includes data security but also encompasses backup and disaster recovery, safe...
Cisco says DevHub site leak won’t enable future breaches
Cisco says that non-public files recently downloaded by a threat actor from a misconfigured public-facing DevHub portal don’t...
New FakeCall Malware Variant Hijacks Android Devices for Fraudulent Banking Calls
Cybersecurity researchers have discovered a new version of a well-known Android malware family dubbed FakeCall that employs voice...
The environmental campaigners fighting against data centres
A growing global movement is seeing people object to data centres in their locality. Source:: BBC News –...
Meet Interlock — The new ransomware targeting FreeBSD servers
A relatively new ransomware operation named Interlock attacks organizations worldwide, taking the unusual approach of creating an encryptor...
ChatGPT-4o can be used for autonomous voice-based scams
Researchers have shown that it’s possible to abuse OpenAI’s real-time voice API for ChatGPT-4o, an advanced LLM chatbot,...
DNA-testing site 23andMe fights for survival
Once millions used it to find out about their family histories – this week it was almost delisted....
Hunt for Bitcoin’s elusive creator Satoshi Nakamoto hits another dead-end
Why are still no closer to unmasking the mysterious Satoshi Nakamoto? Source:: BBC News – Technology
Microsoft SharePoint RCE bug exploited to breach corporate network
A recently disclosed Microsoft SharePoint remote code execution (RCE) vulnerability tracked as CVE-2024-38094 is being exploited to gain...
Microsoft Outlook workaround fixes freezes when copying text
Microsoft is investigating a known issue that affects Microsoft 365 customers and causes classic Outlook to hang or...