Marko Polo Cybercrime Gang Expands Financial Fraud Activities
The Marko Polo cybercrime gang, based in Eastern Europe, targets online gaming and cryptocurrency markets with malware and social engineering tactics, stealing millions from victims.
View full story…
Google Enhances Post-Quantum Encryption Protection on Chrome Desktop with ML-KEM Standard
Google upgrades Chrome desktop encryption to ML-KEM standard approved by NIST, improving security against quantum computers and addressing vulnerabilities like EUCLEAK side-channel attack.
View full story…
Critical Zero-Click Vulnerability Discovered in macOS Calendar
A zero-click vulnerability in macOS Calendar, tracked as CVE-2022-46723, allows attackers to execute malicious code without user interaction, potentially compromising iCloud data.
View full story…
SolarWinds Addresses Critical Deserialization Vulnerability in Access Rights Manager Software
SolarWinds has patched a critical deserialization vulnerability in its Access Rights Manager software, allowing authenticated users to potentially execute remote code.
View full story…
83% of Organizations Using AI for Coding Despite Security Concerns
Survey reveals majority of organizations leveraging AI for coding, with open source software prevalent, despite security risks.
View full story…
Financial Services Industry Continues to be Primary Target for DDoS Attacks, Report Finds
Report by Akamai Technologies highlights ongoing DDoS attacks fueled by geopolitical tensions and hacktivist activities targeting financial institutions.
View full story…
Binance Issues Warning About ‘Clipper’ Malware Targeting Cryptocurrency Users
Binance, the world’s largest cryptocurrency exchange, warns of the growing threat from ‘clipper’ malware that manipulates transaction details and targets Android users.
View full story…
CISA Introduces FOCAL Plan to Enhance Federal Cybersecurity Defenses
The Cybersecurity and Infrastructure Security Agency (CISA) has introduced the Federal Civilian Executive Branch (FCEB) Operational Cybersecurity Alignment (FOCAL) Plan to enhance cybersecurity defenses for over 100 Federal Civilian Executive Branch agencies.
View full story…
US Government Imposes Sanctions on Intellexa Consortium for Predator Malware Development
US government sanctions individuals and companies involved in developing and selling Predator malware for unauthorized surveillance purposes.
View full story…
Latest Cybernews
Microsoft Addresses Zero-Day Vulnerability in MSHTML Browser Engine
Cyber espionage group Void Banshee exploits CVE-2024-43461 to distribute Atlantida infostealer malware, highlighting the importance of proactive security measures.
View full story…
Active Exploitation of High-Severity Vulnerability in Ivanti’s Cloud Service Appliance (CSA) CVE-2024-8190
Threat actors are actively exploiting a high-severity vulnerability in Ivanti’s Cloud Service Appliance (CSA) CVE-2024-8190, allowing for remote code execution and unauthorized access to affected systems.
View full story…
Major Tech Companies Collaborate with US Government to Combat Image-Based Sexual Abuse
Major tech companies, including Adobe, Microsoft, and OpenAI, partner with the US government to address image-based sexual abuse, such as non-consensual intimate images and AI deepfakes.
View full story…
Meta Platforms Resumes Data Scraping Plans in UK for AI Training
Meta Platforms will scrape public Facebook and Instagram user posts in the UK to train generative AI models, sparking concerns about privacy and data protection.
View full story…
Google Addresses Critical Security Flaw in Cloud Composer Service, Mitigating Remote Code Execution Threats
Google patched a critical security flaw in its Cloud Composer service, known as CloudImposer, which could have allowed threat actors to execute remote code on Google Cloud Platform servers.
View full story…