News
Venom Stealer: redefining the next generation of credential theft
6+ hour, 23+ min ago (404+ words) Silent and persistent: the threat that never stops stealing While traditional infostealers tend to "come, take data, and leave," this tool is designed to stay and continuously steal information. "Chrome v10 and v20 password encryption is bypassed through a silent privilege escalation…...
WiFi security evolution: WEP vs. WPA, WPA2, and WPA3
6+ hour, 34+ min ago (1726+ words) Understand the strengths and weaknesses of every WiFi protocol to ensure your network uses the highest level of encryption available. The pre-shared key is much more robust than WEP's basic "password" system. WPA requires a minimum length and a combination…...
Axios library compromised: malware distributed to millions of systems
6+ hour, 39+ min ago (285+ words) Developers who installed the compromised versions may have had their systems infected within minutes. A cyberattack on the popular JavaScript library Axios has put developers and companies worldwide at risk. Threat actors managed to access the main administrator's account on…...
Don’t get clicked: how to spot and stop online scams
1+ day, 6+ hour ago (293+ words) In an era of rising cyber threats, mastering fraud detection is essential. Here's how to stay safe and browse with confidence. Internet fraud is a strategy used by cybercriminals to deceive people and steal their money, personal information, or sensitive…...
From infection to dark web sale: the 48-hour infostealer cycle
2+ day, 6+ hour ago (270+ words) This breed of malware allows cybercriminals to flip stolen credentials on the dark web in record time. This type of malware operates very differently from traditional database breaches: instead of stealing an entire database, infostealers infiltrate directly into individual devices…...
Cisco breached: ShinyHunters claim responsibility
2+ day, 6+ hour ago (368+ words) ShinyHunters claim theft of 3M Salesforce records and AWS data from Cisco ShinyHunters has been active since 2019 and has been involved in multiple data breaches at companies from various sectors, from social networks and digital platforms to telecommunications services and large…...
The state of disbelief: decoding the 95% lack of trust in cybersecurity
3+ day, 6+ hour ago (614+ words) Record investment, historic low trust: the cybersecurity paradox Ross McKerchar, Chief Information Security Officer at Sophos, explains it with a compelling idea: "Trust is not an abstract concept in cybersecurity, but a quantifiable risk factor." When transparency or maturity of…...
Do threats to Big Tech in the Middle East risk global network disruptions?
3+ day, 2+ hour ago (289+ words) The Iranian Revolutionary Guard has threatened to attack facilities of nearly twenty major companies, many of them tech companies, including Microsoft, Apple, Google, Meta, Boeing, and Tesla. In a statement reported by the Iranian news agency Tasnim, the IRGC emphasized…...
Lapsus$ claims cyberattack on AstraZeneca
3+ day, 6+ hour ago (316+ words) The group, once made up of teenage hackers, says it has obtained 3GB of data from the pharmaceutical giant. The cybercriminal collective Lapsus$ has claimed to have breached the internal systems of global pharmaceutical company AstraZeneca, exfiltrating approximately 3GB of sensitive corporate…...
India targets Chinese tech with new ban on CCTV sales
4+ day, 6+ hour ago (494+ words) Major firms including Hikvision, Dahua, and TP-Link are barred from the Indian market over national security concerns. Starting April 1, the Government of India will take a decisive step in its digital security policy by effectively banning the sale of Internet-connected…...