-
Governance
911 S5 Botnet Operators Sanctioned By U.S. Treasury
The 911 S5 botnet compromised approximately 19 million IP addresses and facilitated the submission of tens of thousands of fraudulent…
-
Governance
911 S5 – Likely The World’s Largest Botnet, Dismantled
YunHe Wang, a Chinese national alleged to be the administrator of the botnet, was arrested on May 24, said U.S.…
-
Governance
Operation Endgame: Largest Crackdown On Ransomware-Delivering Botnets
International operation shuttered ransomware operations and dropper malware including IcedID, SystemBC, Pikabot, Smokeloader, Bumblebee and TrickBot leading to four arrests…
-
DarkWeb
Dark Web Hacker Advertises XSS-DOM Risks In Google Subdomains
Tombstone's Exploit post lacked pricing, urging private inquiries. The vulnerabilities endanger Google, demanding swift action. by Ashish Khaitan June 12th,…
-
DarkWeb
Monti Ransomware Sold! New Owners Hint Future Plans
The change in ownership and a shift in focus towards Western countries highlights a new approach towards ransomware. by Ashish…
-
DarkWeb
Hacker Advertises New Click Fraud Software For Google ADS
The threat actor claims that the new click fraud software offers innovative features, capable of depleting competitors' budgets. by Ashish…
-
DarkWeb
IT Army Of Ukraine Claims The SPIEF 2024 Cyberattack
The SPIEF 2024 cyberattack employed DDoS assaults, peaking at 200,000 malicious requests per second. by Ashish Khaitan June 13th, 2024…
-
Regulations
UK’s ICO Warns Not To Ignore Data Privacy Amid Gen AI Race
Organizations developing or using generative AI must consider data protection from the outset, including rigorously assessing and mitigating risks to…
-
Regulations
U.S. House Panel Takes On AI Security And Misuse
A House committee heard testimony outlining AI's threat to national and cyber security – along with some possible solutions. by…
-
Regulations
SEC Fines NYSE Owner ICE For Delayed Reporting Of VPN Breach
SEC officials found out about the breach while investigating similar incidents. by Paul Shread May 22nd, 2024 Share on LinkedInShare…
-
Regulations
OpenAI Announces Safety And Security Committee Amid New Model Development
The Safety and Security Committee's first task will be to evaluate and further develop OpenAI’s processes and safeguards over the…
-
Cyber Warfare
Void Manticore: Iranian Threat Actor Targeting Israel
The threat actor combines data wiping attacks with psychological warfare by Mihir Bagwe May 20th, 2024 Share on LinkedInShare on…
-
Cyber Warfare
Russian Hackers Use Remote Monitoring Tool To Spy On Ukraine
The malicious scripts are hidden among the legitimate Python code of the “Minesweeper” game from Microsoft by Mihir Bagwe May…
-
Espionage
Russia Biggest Cyber Threat To Election Security
Espionage and influence operations from Chinese and Iranian state actors also expected to rise as elections approach in key nations…
-
Espionage
Chinese APT31 State Hackers Targeted Six Australian MPs
Australian security agencies chose not to inform the lawmakers of the cyberattacks that took place in January 2021, despite the…
-
Espionage
Multiple Cybersecurity Incidents Rock British Columbia Govt
Opposition spars with government in the House for delayed notification and lack of transparency by Mihir Bagwe May 10th, 2024…
-
Espionage
Russian Hackers Used New Backdoors To Spy On European MFA
Dubbed “LunarWeb” and “LunarMail” these novel backdoors are attributed to the Turla cyberespionage group, believed to be aligned with Russian…
-
Data Breach News
What Is Internet? History, Working, Uses, Advantages
Analyze the comprehensive guide What is Internet, covering its historical evolution, operational mechanisms, diverse applications, and the associated benefits and…
-
Data Breach News
Decoding D-Link NAS Vulnerabilities: Risks And Mitigation
A user named "netsecfish" disclosed these D-Link vulnerabilities and it targets the nas_sharing.cgi CGI script. by Ashish Khaitan April 12th,…
-
Data Breach News
What Are Vulnerabilities: Types, Examples, Causes, And More!
Protect your data! This article talks about what are vulnerabilities, their types & causes, and details how to implement a…
-
Data Breach News
Multi Factor Authentication Not Enough!
The upcoming Special Publication (SP) 800-171 revisions by the NIST will provide the next Cybersecurity Maturity Model Certification (CMMC). by…
-
Data Breach News
What Is Hacking: Your Complete Safety Guide 2024
Curious about what is hacking? Learn what hacking is, what different hacker types are, their motivations, how they operate to…
-
Hacking
Corse GSM Data Breach: Millions Of Customers Maybe Affected
Threat actor claims to possess user data, including names, emails, phone numbers, and possibly financial details. by Krishna Murthy June…
-
Hacking
NoName Ransomware Targets Germany For Ukrainian Prez Visit
The group has allegedly targeted German government websites and has not provided details of compromised data or website downtime by…
-
Hacking
CyberDragon Hacking Group Targets South Korea Over Ukraine Aid
CyberDragon hacking group targets South Korean sites over Ukraine support. Government, financial institutions, and Incheon Airport hit in DDoS attack.…
-
Workforce
Top 5 ISO 27001 Certification Software Tools In 2023
Achieving ISO 27001 certification can provide your business with a competitive edge, as it demonstrates your commitment to protecting sensitive…
-
Workforce
Top 10 Essential Google Hacks For Cybersecurity Professional
In this comprehensive guide, we will reveal the top 10 Google hacks that every cybersecurity professional should know in 2023. …
-
Workforce
Insider Threats And Reasons Why They Scar Digital Security
Not just insider threats, organizations must take into consideration the reasons why office insiders have failed as reflected in famous…
-
Workforce
The Power Of Cybersecurity Journalism During Wartime
Cybersecurity journalism during wartime requires the know-how of some of the latest technology and interest in updating the masses besides…
-
Workforce
AI Vs. Cyberbullying: Protecting The Vulnerable
In a world where the shadows of cyberbullying loom large, a silent guardian has emerged, and it's not your conventional…