Lapsus$: GTA 6 hacker sentenced to life in hospital prison
Judge says hacker remains a high risk through his skills and motivation to carry out cyber crime. Source::...
Experts Detail Multi-Million Dollar Licensing Model of Predator Spyware
A new analysis of the sophisticated commercial spyware called Predator has revealed that its ability to persist between...
Chameleon Android Banking Trojan Variant Bypasses Biometric Authentication
Cybersecurity researchers have discovered an updated version of an Android banking malware called Chameleon that has expanded its...
Using virtual reality to diagnose Alzheimer’s disease
Researchers at University College London are investigating how the tech can help with early diagnoses. Source:: BBC News...
New JavaScript Malware Targeted 50,000+ Users at Dozens of Banks Worldwide
A new piece of JavaScript malware has been observed attempting to steal users’ online banking account credentials as...
NIST Researchers Installed a New Quantum Voltage Standard in Spain
NIST delivered the first NIST Standard Reference Instrument (SRI) to Spain’s oldest calibration laboratory, the National Institute of...
Q&A: How Athenahealth moved from traditional AI to genAI and ChatGPT
Athenahealth provides software and services for medical groups and health systems around the country, and finding efficiencies through...
Cost of a Data Breach Report 2023: Insights, Mitigators and Best Practices
John Hanley of IBM Security shares 4 key findings from the highly acclaimed annual Cost of a Data...
Penny Mordaunt says Boris Johnson’s Covid WhatsApp messages went missing
MP Penny Mordaunt tells the Covid inquiry messages to Boris Johnson and Michael Gove went missing. Source:: BBC...
German Authorities Dismantle Dark Web Hub ‘Kingdom Market’ in Global Operation
German law enforcement has announced the disruption of a dark web platform called Kingdom Market that specialized in the sales...
Windows CLFS and five exploits used by ransomware operators (Exploit #4 – CVE-2023-23376)
This is part five of our study about the Common Log File System (CLFS) and five vulnerabilities in...
Windows CLFS and five exploits used by ransomware operators (Exploit #3 – October 2022)
This is part four of our study about the Common Log File System (CLFS) and five vulnerabilities in...
Windows CLFS and five exploits used by ransomware operators (Exploit #2 – September 2022)
This is the third part of our study about the Common Log File System (CLFS) and five vulnerabilities...
Windows CLFS and five exploits used by ransomware operators
In April 2023, we published a blog post about a zero-day exploit we discovered in ransomware attacks that...
Windows CLFS and five exploits used by ransomware operators (Exploit #1 – CVE-2022-24521)
This is the second part of our study about the Common Log File System (CLFS) and five vulnerabilities...
Windows CLFS and five exploits used by ransomware operators (Exploit #5 – CVE-2023-28252)
This is part six of our study about the Common Log File System (CLFS) and five vulnerabilities in...
Hackers Exploiting Old MS Excel Vulnerability to Spread Agent Tesla Malware
Attackers are weaponizing an old Microsoft Office vulnerability as part of phishing campaigns to distribute a strain of...
Social media platform X down for users globally
Users are unable to view posts on the social media site with a message that says”Welcome to X!”...
Urgent: New Chrome Zero-Day Vulnerability Exploited in the Wild – Update ASAP
Google has rolled out security updates for the Chrome web browser to address a high-severity zero-day flaw that...
Amazon Cognito is now available in the Africa (Cape Town) Region
Amazon Cognito is now available in Africa (Cape Town) Region. Amazon Cognito makes it easy to add authentication,...