Browsing Category
Latest News
1077 posts
Two brothers indicted for operating illegal sports streaming service that netted $7 million
The administrators behind illegal sports streaming site 247TVStream were charged this week by the Justice Department after one…
Five alleged members of Scattered Spider cybercrime group charged for breaches, theft of $11 million
The Justice Department unsealed charges against five men accused of running prolific phishing campaigns that allowed them to…
Phobos ransomware indictment sheds light on long-running, quietly successful scheme
U.S. federal government contractors, healthcare providers, public school systems and a law enforcement union were among the targets…
Ai Everything GLOBAL
February 4-6, 2025Location:Abu Dhabi & Dubai, UAE Come meet us at Ai Everything GLOBAL, 4 – 6 February…
Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments
Threat actors are increasingly banking on a new technique that leverages near-field communication (NFC) to cash out victim's funds at scale.
The technique, codenamed Ghost Tap by ThreatFabric, enables cybercriminals to cash-out money from stolen credit cards linked to mobile payment services such as Google Pay or Apple Pay and relaying NFC traffic.
"Criminals can now misuse Google Pay and Apple
NHIs Are the Future of Cybersecurity: Meet NHIDR
The frequency and sophistication of modern cyberattacks are surging, making it increasingly challenging for organizations to protect sensitive data and critical infrastructure. When attackers compromise a non-human identity (NHI), they can swiftly exploit it to move laterally across systems, identifying vulnerabilities and compromising additional NHIs in minutes. While organizations often take
Apple Releases Urgent Updates to Patch Actively Exploited Zero-Day Vulnerabilities
Apple has released security updates for iOS, iPadOS, macOS, visionOS, and its Safari web browser to address two zero-day flaws that have come under active exploitation in the wild.
The flaws are listed below -
CVE-2024-44308 - A vulnerability in JavaScriptCore that could lead to arbitrary code execution when processing malicious web content
CVE-2024-44309 - A cookie management vulnerability in
Oracle Warns of Agile PLM Vulnerability Currently Under Active Exploitation
Oracle is warning that a high-severity security flaw impacting the Agile Product Lifecycle Management (PLM) Framework has been exploited in the wild.
The vulnerability, tracked as CVE-2024-21287 (CVSS score: 7.5), could be exploited sans authentication to leak sensitive information.
"This vulnerability is remotely exploitable without authentication, i.e., it may be exploited over a network
German court says victims of massive Facebook data breach can be compensated
A German court ruled on Monday that thousands of local Facebook users affected by a massive data breach…
Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices
The malware known as Ngioweb has been used to fuel a notorious residential proxy service called NSOCKS, as well as by other services such as VN5Socks and Shopsocks5, new findings from Lumen Technologies reveal.
"At least 80% of NSOCKS bots in our telemetry originate from the Ngioweb botnet, mainly utilizing small office/home office (SOHO) routers and IoT devices," the Black Lotus Labs team at