U.S. Authorities Target Piracy Sites as Italy Shuts Illegal IPTV Operations
Authorities seized zamunda.net, arenabg.com, and zelka.org for copyright infringement. Italian police dismantled three major illegal IPTV services distributing pirated media.…
Google Cuts Millions of Devices from Malicious Proxy Network
Google disrupted IPIDEA’s proxy network, removing millions of compromised devices. The operation impacted about 40% of proxies but left many…
Secret Service Official Urges Stricter Controls on Domain Registration
Gaps in domain registration verification expose businesses to phishing and fraud. Major companies mainly use court actions instead of preventive…
North Korean Cyber Group Splits to Target Multiple Sectors
North Korea's Labyrinth Chollima split into three focused cyber groups. Espionage and cryptocurrency theft remain main objectives for the new…
Hackers Bypass FortiCloud SSO, Target Fortinet Security Products
Threat actors exploited a FortiCloud SSO flaw to bypass authentication controls. Fortinet issued mitigations but has not yet released comprehensive…
Cybercriminals and State Groups Target WinRAR Vulnerability, Google Confirms
Attackers aggressively exploit a patched WinRAR flaw months after disclosure. Both criminal organizations and state-sponsored groups are involved in ongoing…
Experts Question CISA’s Quantum-Resistant Tech Guidance for Agencies
Experts highlight shortcomings in CISA’s post-quantum cryptography guidance. Current solutions often cover key agreement, not complete authentication. Building full PQC…
Cybercriminals Use Voice-Phishing to Breach SSO Accounts and Demand Ransom
Cybercriminals used vishing campaigns to steal SSO credentials and data. Major brands like Okta, SoundCloud, and Betterment were affected. Experts…
Researchers Warn ChatGPT Extensions Steal User Data and Credentials
Researchers identified 16 malicious Chrome extensions targeting ChatGPT users’ credentials. Extensions exploit web authentication, putting chat histories and linked accounts…
NIST Faces Staff Cuts While Accelerating Encryption Validation Efforts
NIST faces staff and budget cuts as it tackles cybersecurity priorities. Reduced workforce prompts faster cryptographic module validation through automation…
