Chinese Cyber Group Salt Typhoon Targets US Telcos with Sophisticated Malware
Salt Typhoon employs advanced malware to target US telecoms. Trend Micro details the group's sophisticated tactics and tools. Officials deem…
Microsoft Seizes 240 Sites Tied to Egyptian Phishing Kit Seller
Microsoft seized 240 websites linked to phishing kit maker. Abanoub Nady operated under the brand ONNX targeting Microsoft accounts. Financial…
Meta Removes Millions of Scam Accounts Linked to ‘Pig Butchering’
Meta has removed millions of scam accounts linked to "pig butchering." The crackdown aims to protect users from sophisticated financial…
Crum & Forster Launches Liability Coverage for CISOs
Crum & Forster introduces liability insurance for CISOs. The policy covers personal liabilities and consulting work. Costs range from $3,000…
Authorities Charge Five for Scattered Spider Cyber Attacks
Five individuals charged for Scattered Spider phishing attacks. Targets included MGM Resorts and Clorox, leading to data theft. Authorities aim…
Senator Pushes FCC to Implement Telecom Wiretap Security Measures
Sen. Blumenthal urges FCC to set wiretap security standards. Chinese hackers exploited lawful access to target campaigns. Implementing standards is…
Microsoft Launches Zero Day Quest to Strengthen AI Security
Microsoft introduces Zero Day Quest to find AI security vulnerabilities. Enhanced rewards and exclusive events incentivize researchers. Collaboration with security…
House Republicans Criticize TSA’s Cybersecurity Regulations
Republicans challenge TSA's cybersecurity regulations. Industries cite high costs and operational burdens. Legislation aims to streamline cyber rules.
Hackers Use Jupyter Notebooks to Stream Champions League Matches
Hackers exploit Jupyter notebooks to stream UEFA matches illegally. Unauthorized streaming diverts revenue from licensed broadcasters. Implementing strong security measures…
US Strengthens Cybersecurity in Energy Supply Chains
US enhances cybersecurity for energy supply chains. Major companies adopt new cybersecurity principles. Regulations target third-party supply chain risks.