Hackers blackmail Globe Life after stealing customer data
Insurance giant Globe Life says an unknown threat actor attempted to extort money in exchange for not publishing...
Sudanese Brothers Arrested in ‘AnonSudan’ Takedown
The U.S. government on Wednesday announced the arrest and charging of two Sudanese brothers accused of running Anonymous...
Top 5 Cloud Security Automations for SecOps Teams
Learn about 5 powerful cloud security automations with Blink Ops to simplify security operations like S3 bucket monitoring,...
Researchers Uncover Cicada3301 Ransomware Operations and Its Affiliate Program
Cybersecurity researchers have gleaned additional insights into a nascent ransomware-as-a-service (RaaS) called Cicada3301 after successfully gaining access to...
The story of web framework Hono, from the creator of Hono
Hono is a fast, lightweight web framework that runs anywhere JavaScript does, built with Web Standards. Of course,...
Biden-Harris Administration Announces Preliminary Terms with Infinera to Support Development of Semiconductor Technology Important for Communications and National Security
Today, the Biden-Harris Administration announced that the Department of Commerce and Infinera have signed a non-binding preliminary memorandum...
Instagram adds features to help stop sextortion
Law enforcement agencies have reported a rise in sextortion scams targeting teens across online platforms. Source:: BBC News...
Data center provider fakes Tier 4 data center certificate to bag $11M SEC deal
Deepak Jain, CEO of a Maryland-based IT services firm, has been indicted for fraud and making false statements...
SideWinder APT Strikes Middle East and Africa With Stealthy Multi-Stage Attack
An advanced persistent threat (APT) actor with suspected ties to India has sprung forth with a flurry of...
SAS CTF and the many ways to persist a kernel shellcode on Windows 7
On May 18, 2024, Kaspersky’s Global Research & Analysis Team (GReAT), with the help of its partners, held...
U.S. Charges Two Sudanese Brothers for Record 35,000 DDoS Attacks
Federal prosecutors in the U.S. have charged two Sudanese brothers with running a distributed denial-of-service (DDoS) botnet for...
Critical Kubernetes Image Builder Vulnerability Exposes Nodes to Root Access Risk
A critical security flaw has been disclosed in the Kubernetes Image Builder that, if successfully exploited, could be...
Social media faces big changes under new Ofcom rules
Ofcom warns social media companies could face fines if they don’t comply with the new Online Safety Bill...
US ‘click to cancel’ rule to ban subscription traps
New rule requires businesses to make subscribing and cancelling subscriptions equally simple. Source:: BBC News – Technology
Iranian hackers act as brokers selling critical infrastructure access
Iranian hackers are breaching critical infrastructure organizations to collect credentials and network data that can be sold on...
How does WhatsApp make money? It’s free – with some tricks
We all use messaging apps such as Whatsapp for free, but what’s in it for them? Source:: BBC...
Cisco Unified Contact Center Management Portal Reflected Cross-Site Scripting Vulnerability
A vulnerability in the web-based management interface of Cisco Unified Contact Center Management Portal (Unified CCMP) could allow...
Cisco UCS Central Software Configuration Backup Information Disclosure Vulnerability
A vulnerability in the backup feature of Cisco UCS Central Software could allow an attacker with access to...
Cisco ATA 190 Series Analog Telephone Adapter Firmware Vulnerabilities
Multiple vulnerabilities in Cisco ATA 190 Series Analog Telephone Adapter firmware, both on-premises and multiplatform, could allow a...
Google: 70% of exploited flaws disclosed in 2023 were zero-days
Mandiant security analysts warn of a worrying new trend of threat actors demonstrating a better capability to discover...