Oligo Security Introduces Application Attack Matrix to Map App Layer Threats
Oligo Security launched the Application Attack Matrix for application-layer threats. The framework aims to address limitations in the MITRE ATT&CK…
Call of Duty Pulls PC Game After Hackers Seize Players’ Computers
Call of Duty: World War 2 PC was taken offline due to major security issues. Hackers exploited peer-to-peer networking to…
Scattered Spider Tactics Pressure Companies With Rapid Social Attacks
Scattered Spider uses social engineering to access major organizations across industries. Attribution remains difficult due to the group’s adaptability and…
Congress Directs Major Funding to Military Cybersecurity Initiatives
Congress allocated major cybersecurity funds, focusing on military agencies. Limited direct funding went to civilian cyber infrastructure. Bipartisan debate on…
China-Linked Cyberattack Targets French Infrastructure Using Ivanti Flaws
Ivanti vulnerabilities led to major attacks on French critical sectors in 2024. UNC5174, linked to China, exploited zero-days to steal…
FBI Reports Chinese Hackers Remain Contained in US Telecoms
Salt Typhoon remains dormant but contained in US telecom company networks. Authorities face difficulties removing entrenched cyber actors from infrastructure.…
Cloudflare Lets Websites Set Fees for AI-Crawling Bots
Cloudflare introduced a pay-per-crawl system for managing AI web crawlers. Both content producers and AI trainers may now negotiate access…
AT&T Launches Wireless Account Lock to Block SIM-Swapping Attacks
AT&T introduced Wireless Account Lock to shield users from SIM-swapping scams. The feature provides granular control, restricting key changes to…
US Authorities Target North Korean IT Worker Schemes and Make Arrest
US targets North Korean IT workers infiltrating American companies. Authorities seized millions and arrested key suspects of the scheme. Vigilance…
Hacker Tracks FBI Agent, Cartel Targets Witnesses in El Chapo Case
Cartel-hired hacker exploited surveillance to track FBI agent and witnesses in Mexico. Technological gaps exposed sources and led to intimidation…