In a recent cyber espionage campaign, the threat actors, allegedly linked to the group known as Patchwork, are observed to…
Cybersecurity
Apple Unveils Stricter Guidelines to Curb Data Misuse and Fingerprinting by Developers
In a bold move to strengthen user privacy, Apple Inc. has revealed that it will compel developers to outline their…
New AI Threat Tool ‘FraudGPT’ Enables Advanced Cyberattacks
In the ominous shadow of the WormGPT tool, another artificial intelligence (AI) tool designed for cybercrime, dubbed FraudGPT, has been…
Cybersecurity and Infrastructure Security Agency Report: Over Half of Cyberattacks Involve Legitimate Credentials
The Cybersecurity and Infrastructure Security Agency (CISA) reported on Wednesday that over half of all cyberattacks on government and state-level…
Independent Lab Validates Nubeva’s Innovative Ransomware Key Interception and Decryption Technology
Nubeva, a tech company headquartered in San Jose, California, has developed a unique product, NuRR (Nubeva Ransomware Reversal), touted to…
IBM Report Reveals Data Breach Costs Surge to $4.45 Million in 2023
IBM’s annual Cost of a Data Breach Report for 2023 has unveiled a startling increase in the global average cost…
Unpatched Citrix Servers Remain Vulnerable to CVE-2023-3519 RCE Attacks: Over 15,000 at Risk
The cybersecurity world was shaken as Shadowserver Foundation, a cyber threat intelligence organization, disclosed that more than 15,000 Citrix servers…
Lazarus Hackers Exploit Microsoft IIS Servers for Malware Dissemination
The Lazarus hacking group, reportedly backed by North Korea, is reportedly exploiting Windows Internet Information Service (IIS) servers, infiltrating them…
Atera Windows Installers’ Zero-Day Vulnerabilities Pose Risk of Privilege Escalation Attacks
Critical zero-day vulnerabilities identified in Atera remote monitoring and management software’s Windows Installers are posing significant risks as they expose…
Remote Command Injection Risk via New OpenSSH Flaw: Linux Systems Warned
A now-resolved vulnerability in OpenSSH was discovered that could potentially be exploited to execute arbitrary commands remotely on vulnerable hosts…