Items tagged with cybersecurity
by
Chris Harper - Tue, Nov 04, 2025
If you were ordered to pick a random number and guess "zero", it may be a great choice—but not if it's what you pick every time you're asked, as current AMD Zen 5 CPUs are prone to do in certain conditions. Specifically, AMD has confirmed...
Read more...
by
Alan Velasco - Fri, Oct 31, 2025
A new threat in is the wild affecting sites that run WordPress, a popular content management system. Wordfence, a company that focuses on security research in the WordPress ecosystem, is reporting that a vulnerability is affecting the...
Read more...
by
Chris Harper - Tue, Oct 28, 2025
Windows Server 2025 is currently open to a Remote Code Execution exploit via the Windows Update Service, and at the time of this writing a fix from Microsoft has yet to fully patch the issue. Reports to The Register indicate that...
Read more...
by
Alan Velasco - Mon, Oct 27, 2025
Just weeks after a breach led to the theft of sensitive user data that included government issued IDs, Discord users have a new cybersecurity issue to worry about. Security researchers at Netskope have spotted hackers repurposing an open...
Read more...
by
Alan Velasco - Wed, Oct 15, 2025
A recent Discord data breach, which included users’ government issued IDs, has taken taken another twist after the hackers disputed the accuracy of the company’s disclosure. This time, 5CA, the contracting company Discord pinned the blame...
Read more...
by
Aaron Leong - Fri, Oct 10, 2025
A financially-motivated hacking group, tracked by Microsoft as Storm-2657, has so far successfully compromised employee accounts at three U.S. universities to steal their salaries in what campaign experts are deeming "payroll pirate"...
Read more...
by
Alan Velasco - Thu, Oct 09, 2025
Discord, the latest company to be hit with a data breach, is on the defensive after the group responsible for the attack made statements to Bleeping Computer regarding the extent of the intrusion. Because the company is refusing to pay a...
Read more...
by
Chris Harper - Sat, Sep 27, 2025
Like technology and life at large, even familiar malware continues to evolve—to wit, Microsoft warns that MacOS malware XCSSET has undergone another major evolution since earlier this year, bringing key changes to its "browser targeting...
Read more...
by
Zak Killian - Mon, Sep 22, 2025
While some would like to see themselves as Robin Hood-type, well-intentioned opportunists, it has long been known that there is no honor among thieves. Case in point: today's story, where a man named Raivo Plavnieks was trying to raise...
Read more...
by
Chris Harper - Sat, Sep 06, 2025
Passkeys are just as vulnerable to browser-side attacks as more traditional forms of authentication, per SquareX. SquareX is a cybersecurity firm known best for its BDR ("Browser Detection and Response") enterprise security solutions, and...
Read more...
by
Alan Velasco - Fri, Sep 05, 2025
Security researchers at ESET have discovered a new threat actor in the constantly evolving cybersecurity space. The hacker group, dubbed GhostRedirector, has been attacking Windows servers using novel, custom tools. Apparently, this...
Read more...
by
Victor Awogbemila - Fri, Aug 29, 2025
We are not expecting a decline in the number of data breaches and ransomware campaigns anytime soon. At least not at a time when AI is becoming an enabler for the malicious activities of black hat hackers. We’ve published a lot of reports...
Read more...
by
Victor Awogbemila - Tue, Aug 26, 2025
The cruelty of black hat hackers seems to know no bounds as they operate with complete disregard for ethical considerations. Just a few days ago, we reported on a vicious ransomware attack on a kidney dialysis organization, and prior to...
Read more...
by
Alan Velasco - Fri, Aug 22, 2025
Update, 8/23/25, 1:45 PM ET: The company that makes the Flipper Zero has released a blog post in response to recent stories regarding stolen vehicles. The blog post states that, "the so-called hacker firmwares for Flipper Zero don’t add anything new — they just reuse techniques documented...
Read more...
by
Alan Velasco - Tue, Jul 22, 2025
CrushFTP, a service that provides users with secure file server software, has recently been targeted by hackers. Unfortunately, it seems as if some customers have been compromised, with thousands of servers still vulnerable to being...
Read more...
by
Aaron Leong - Thu, Jul 17, 2025
Luxury fashion brand Louis Vuitton is grappling with the fallout from its third cyberattack in as many months, with recent breaches affecting customer data in the UK, South Korea, and Turkey. All of the attacks are so far believed to be...
Read more...
by
Alan Velasco - Fri, Jul 11, 2025
The rise of AI has resulted in the technology permiating our daily life, with many companies using it their hiring process. That includes McDonald’s, which deploys a chatbot named Olivia made by Paradox.ai on its McHire.com site...
Read more...
by
Paul Lilly - Thu, Jun 12, 2025
If you're like me, you spend part of your morning sifting through your inbox to separate the important stuff from the deluge of junk mail that fills it up each and every day (including Gmail accounts, despite Google's best efforts). Even...
Read more...
by
Zak Killian - Wed, Jun 11, 2025
A newly disclosed Secure Boot vulnerability is putting a large number of PCs at risk of bootkit attacks, with security researchers urging immediate patching. The flaw, tracked as CVE-2025-3052, was uncovered by Binarly Research and...
Read more...
by
Zak Killian - Fri, Jun 06, 2025
A new variant of the BADBOX malware campaign has taken root in over a million Android-based devices worldwide, and if you’ve picked up a cheap smart TV box or projector off Amazon or AliExpress lately, you might be part of the problem...
Read more...
by
Aaron Leong - Thu, May 29, 2025
Lingerie giant Victoria's Secret has abruptly taken down its U.S. website and some in-store services, citing an ongoing "security incident." The move, which has left customers unable to access online shopping and order tracking, comes as...
Read more...
by
Zak Killian - Tue, May 27, 2025
It might surprise you to learn this, but cybercriminals are usually fairly protective of the data they steal, because things like credentials and login details have value, and can be sold to the right buyer. That's why it's so unusual that...
Read more...