Critical Flaw in ProjectSend Under Active Exploitation Against Public-Facing Servers
A critical security flaw impacting the ProjectSend open-source file-sharing application has likely come under active exploitation in the...
US regulator says AI scanner ‘deceived’ users after BBC story
In a proposed settlement, Evolv Technology will be banned from making certain claims about its products. Source:: BBC...
Police bust pirate streaming service making €250 million per month
An international law enforcement operation has dismantled a pirate streaming service that served over 22 million users worldwide and made...
The Black Friday 2024 Cybersecurity, IT, VPN, & Antivirus Deals
Black Friday 2024 is almost here, and great deals are already live in computer security, software, online courses,...
Researchers Discover “Bootkitty” – First UEFI Bootkit Targeting Linux Kernels
Cybersecurity researchers have shed light on what has been described as the first Unified Extensible Firmware Interface (UEFI)...
Product Safety Report: Feet Warmer, FY-HWJB68 sold via Amazon (2411-0103)
Source:: UK Gov Product Safety Alerts, Reports and Recalls
Latest Multi-Stage Attack Scenarios with Real-World Examples
Multi-stage cyber attacks, characterized by their complex execution chains, are designed to avoid detection and trick victims into...
Product Safety Report: Unbranded Battery Charger QD-261078 for Vacuum Cleaner sold via eBay (2407-0169)
Source:: UK Gov Product Safety Alerts, Reports and Recalls
APT-C-60 Exploits WPS Office Vulnerability to Deploy SpyGlace Backdoor
The threat actor known as APT-C-60 has been linked to a cyber attack targeting an unnamed organization in...
Product Safety Report: Bedside Tables with Electrical Connections (2408-0059)
Source:: UK Gov Product Safety Alerts, Reports and Recalls
Consumer and privacy predictions for 2025
Overview of 2024 consumer cyberthreats and trends predictions Part of the Kaspersky Security Bulletin, our predictions for 2024...
INTERPOL Busts African Cybercrime: 1,006 Arrests, 134,089 Malicious Networks Dismantled
An INTERPOL-led operation has led to the arrest of 1,006 suspects across 19 African countries and the takedown...
Matrix Botnet Exploits IoT Devices in Widespread DDoS Botnet Campaign
A threat actor named Matrix has been linked to a widespread distributed denial-of-service (DoD) campaign that leverages vulnerabilities...
Equinix to cut 3% of staff amidst the greatest demand for data center infrastructure ever
Even as demand for data infrastructure surges to an all-time high, Equinix is planning to lay off 3%...
Hacker in Snowflake Extortions May Be a U.S. Soldier
Two men have been arrested for allegedly stealing data from and extorting dozens of companies that used the...
AWS PrivateLink now supports cross-region connectivity
AWS PrivateLink now supports native cross-region connectivity. Until now, Interface VPC endpoints only supported connectivity to VPC endpoint...
Amazon Aurora now supports Graviton4-based R8g database instances
AWS Graviton4-based R8g database instances are now generally available for Amazon Aurora with PostgreSQL compatibility and Amazon Aurora...
New NachoVPN attack uses rogue VPN servers to install malicious updates
A set of vulnerabilities dubbed “NachoVPN” allows rogue VPN servers to install malicious updates when unpatched Palo Alto...
Introducing Advanced Scaling in Amazon EMR Managed Scaling
We are excited to announce Advanced Scaling, a new capability in Amazon EMR Managed Scaling which provides customers...
Amazon EBS announces Time-based Copy for EBS Snapshots
Today, Amazon Elastic Block Store (Amazon EBS), a high-performance block storage service, announces the general availability of Time-based...