XE Group Shifts Tactics to Zero-Day Exploits
XE Group moved from credit-card skimming to zero-day vulnerabilities. Their focus now includes global supply chains in manufacturing sectors. Vulnerabilities…
WhatsApp Halts Spyware Attack Targeting Journalists and Activists
WhatsApp disrupted a spyware attack targeting 90 individuals. Paragon, linked to the attack, was recently acquired by AE International. The…
US Government Agencies Face Cryptojacking Attacks
US federal agencies, including USAID, are targeted by cryptojacking. Cryptojacking degrades system performance and increases operational costs. Enhanced security measures…
Senate Raises Concerns Over FBI Nominee’s Cybercrime Strategy
Senate questions FBI nominee Kash Patel's cybercrime plans. Patel's proposal to repurpose FBI headquarters raises concerns. Debate highlights the future…
US and Dutch Authorities Crack Down on Pakistan Cybercrime Ring
International agencies dismantle HeartSender cybercrime network. Operation Heart Blocker seized 39 domains and servers. Significant disruption limits phishing and cyberattacks.
Data Breach at DeepSeek Exposes Over a Million Internal Records
DeepSeek suffered a major data breach exposing over a million records. Wiz identified the flaw in DeepSeek’s publicly accessible ClickHouse…
DARPA Develops Firmware to Combat Cyberattacks
DARPA's Red-C project aims to embed self-healing security into firmware. The initiative focuses on bus systems like PCIe and CXL…
FBI Takes Over Major Cybercrime Platforms Globally
FBI seized control of major cybercrime platforms globally. Operation involved multiple international law enforcement agencies. Shut down disrupts activities like…
Lightning.AI Fixes Critical Vulnerability in AI Development Platform
Lightning.AI patched a critical AI platform vulnerability quickly. Vulnerability allowed remote code execution and data access. Users are now protected…
Lawsuit Alleges OPM’s Email Systems Illegal and Insecure
OPM faces lawsuit over its federal email systems’ legality and security. Allegations include privacy law violations and data breach risks.…