Items tagged with cybersecurity
by
Chris Harper - Sat, Sep 27, 2025
Like technology and life at large, even familiar malware continues to evolve—to wit, Microsoft warns that MacOS malware XCSSET has undergone another major evolution since earlier this year, bringing key changes to its "browser targeting...
Read more...
by
Zak Killian - Mon, Sep 22, 2025
While some would like to see themselves as Robin Hood-type, well-intentioned opportunists, it has long been known that there is no honor among thieves. Case in point: today's story, where a man named Raivo Plavnieks was trying to raise...
Read more...
by
Chris Harper - Sat, Sep 06, 2025
Passkeys are just as vulnerable to browser-side attacks as more traditional forms of authentication, per SquareX. SquareX is a cybersecurity firm known best for its BDR ("Browser Detection and Response") enterprise security solutions, and...
Read more...
by
Alan Velasco - Fri, Sep 05, 2025
Security researchers at ESET have discovered a new threat actor in the constantly evolving cybersecurity space. The hacker group, dubbed GhostRedirector, has been attacking Windows servers using novel, custom tools. Apparently, this...
Read more...
by
Victor Awogbemila - Fri, Aug 29, 2025
We are not expecting a decline in the number of data breaches and ransomware campaigns anytime soon. At least not at a time when AI is becoming an enabler for the malicious activities of black hat hackers. We’ve published a lot of reports...
Read more...
by
Victor Awogbemila - Tue, Aug 26, 2025
The cruelty of black hat hackers seems to know no bounds as they operate with complete disregard for ethical considerations. Just a few days ago, we reported on a vicious ransomware attack on a kidney dialysis organization, and prior to...
Read more...
by
Alan Velasco - Fri, Aug 22, 2025
Update, 8/23/25, 1:45 PM ET: The company that makes the Flipper Zero has released a blog post in response to recent stories regarding stolen vehicles. The blog post states that, "the so-called hacker firmwares for Flipper Zero don’t add anything new — they just reuse techniques documented...
Read more...
by
Alan Velasco - Tue, Jul 22, 2025
CrushFTP, a service that provides users with secure file server software, has recently been targeted by hackers. Unfortunately, it seems as if some customers have been compromised, with thousands of servers still vulnerable to being...
Read more...
by
Aaron Leong - Thu, Jul 17, 2025
Luxury fashion brand Louis Vuitton is grappling with the fallout from its third cyberattack in as many months, with recent breaches affecting customer data in the UK, South Korea, and Turkey. All of the attacks are so far believed to be...
Read more...
by
Alan Velasco - Fri, Jul 11, 2025
The rise of AI has resulted in the technology permiating our daily life, with many companies using it their hiring process. That includes McDonald’s, which deploys a chatbot named Olivia made by Paradox.ai on its McHire.com site...
Read more...
by
Paul Lilly - Thu, Jun 12, 2025
If you're like me, you spend part of your morning sifting through your inbox to separate the important stuff from the deluge of junk mail that fills it up each and every day (including Gmail accounts, despite Google's best efforts). Even...
Read more...
by
Zak Killian - Wed, Jun 11, 2025
A newly disclosed Secure Boot vulnerability is putting a large number of PCs at risk of bootkit attacks, with security researchers urging immediate patching. The flaw, tracked as CVE-2025-3052, was uncovered by Binarly Research and...
Read more...
by
Zak Killian - Fri, Jun 06, 2025
A new variant of the BADBOX malware campaign has taken root in over a million Android-based devices worldwide, and if you’ve picked up a cheap smart TV box or projector off Amazon or AliExpress lately, you might be part of the problem...
Read more...
by
Aaron Leong - Thu, May 29, 2025
Lingerie giant Victoria's Secret has abruptly taken down its U.S. website and some in-store services, citing an ongoing "security incident." The move, which has left customers unable to access online shopping and order tracking, comes as...
Read more...
by
Zak Killian - Tue, May 27, 2025
It might surprise you to learn this, but cybercriminals are usually fairly protective of the data they steal, because things like credentials and login details have value, and can be sold to the right buyer. That's why it's so unusual that...
Read more...
by
Zak Killian - Wed, May 14, 2025
Intel is once again in the crosshairs of a fresh speculative execution exploit, this time dubbed "Branch Privilege Injection." The new vulnerability, revealed by researchers at ETH Zurich's COMSEC group, is capable of extracting sensitive...
Read more...
by
Aaron Leong - Fri, Apr 18, 2025
In a recent study, scientists sounded the alarm on the vulnerability of DNA data, particularly those obtained through next-generation DNA sequencing (NGS), against nefarious hackers. While no known bio-data breach has occurred in the real...
Read more...
by
Victor Awogbemila - Mon, Mar 24, 2025
Modern AI is far from science-fiction AGI, and yet it can still be an incredibly powerful tool. Like any tool, if misused, it can pose a threat to legitimate users, like how we recently covered photographers' concerns that Google's Gemini...
Read more...
by
Victor Awogbemila - Tue, Mar 18, 2025
You probably have experienced situations where you needed to convert files from one format to another. In these cases, free online file converters are a common solution. However, the FBI Denver Field Office has just taken to X (formerly...
Read more...
by
Zak Killian - Wed, Feb 05, 2025
Netgear has issued an urgent security update for six of its popular WiFi home gateways, including three Nighthawk Pro gaming routers, after researchers uncovered severe Remote Code Execution (RCE) vulnerabilities. These flaws, which allow...
Read more...
by
Zak Killian - Wed, Jan 29, 2025
Before we get started, let's clarify this headline. "DeepSeek" is the name of a Chinese AI startup that has produced some very impressive AI models, given the limited resources at its disposal. It is also the name of that startup's mobile...
Read more...
by
Alan Velasco - Wed, Jan 29, 2025
Malicious actors have a variety of techniques to try and ensnare victims online, one of which is scareware. It entails displaying web pages designed to convince a user that their system has been somehow compromised, but promises to offer a...
Read more...