Threat Actors Utilize High-Performance Bots for Cyber Attacks
Threat actors abuse high-performance bots for automated cyber attacks. Bondnet uses compromised systems as Command and Control servers. Cloudflare tunneling…
North Korean Hackers Continue Targeting Open-Source Ecosystem
North Korean hackers target the open-source ecosystem. Moonstone Sleet adopts sophisticated tactics to spread malware. Continued vigilance and collaboration are…
Hackers Compromise Tile Customer Data
Life360 faced an extortion attempt involving Tile customer data. Compromised data included personal details, excluding sensitive information. Company took immediate…
Microsoft Delays AI Recall Release Over Privacy Concerns
Microsoft delays Recall release over privacy concerns. Feature now opt-in, with added security measures. Experts still wary of potential risks…
SmokeLoader Malware Evolves with Advanced Capabilities
Hackers use malware for various criminal activities and espionage. SmokeLoader, launched in 2011, has evolved into a sophisticated tool. Ongoing…
GitHub Celebrates 10 Years of Bug Bounty Program
GitHub marks 10 years of its Security Bug Bounty program. The program rewarded researchers with $4 million in total payouts.…
Kulicke and Soffa Disclose Major Data Breach
Kulicke and Soffa disclose a data breach affecting 12 million files. Cybersecurity teams acted swiftly to contain the breach and…
Threat Actor Breaches Israel’s Government API Database
A threat actor claims to have breached Israel's government API database. The alleged breach involves extensive personal and sensitive governmental…
Fortinet Urges Users to Update FortiOS Amid Vulnerability
Fortinet discloses multiple vulnerabilities in FortiOS. Authenticated attackers can execute unauthorized code or commands. Users advised to upgrade to secure…
Ukrainian Police Arrest Key Developer of Ransomware Cryptors
Ukrainian police arrested a key developer of ransomware cryptors. The arrest is part of the international 'Operation Endgame.' The suspect's…