Allegedly swiped more than 5.2M files and threatens to publish the lot Ransomware gang Hunters International reportedly claims to have stolen more than 5.2 million files belonging to the London branch of the Industrial and Commercial Bank of China (ICBC),…
Google Introduces ‘Air-Gapped’ Backup Vault to Thwart Ransomware
“It’s critical to not only back up your critical workloads, but also to secure those backups against subsequent modification and deletion.” The post Google Introduces ‘Air-Gapped’ Backup Vault to Thwart Ransomware appeared first on SecurityWeek. This article has been indexed…
Slim CD Data Breach Exposes Credit Card Information of 1.7 Million Customers
Payment processor Slim CD has reported a data breach that exposed the credit card and personal information of nearly 1.7 million people. According to a notification sent to those affected, the company revealed that unauthorized access to its network…
Kali Linux 2024.3 released: 11 new tools, Qualcomm Snapdragon SDM845 SoC support
Kali Linux 2024.3 is now available for download. Besides the new tools, this release mainly focuses on behind-the-scenes updates and optimization. New tools in Kali Linux 2024.3 This Kali release is about new tools and package updates: goshs – Think…
Navigating the Risks of Namespace Collision: A Critical Security Challenge
In today’s digital landscape, organizations face a multitude of cybersecurity threats, one of which is the often-overlooked issue of namespace collision. This vulnerability arises when internal domain names conflict with newly registered top-level domains (TLDs), exposing sensitive data to potential…
Microsoft Fixes Four 0-Days — One Exploited for SIX YEARS
Week B: Bugs begone! This month Redmond fixes 79 security flaws in Windows and other products The post Microsoft Fixes Four 0-Days — One Exploited for SIX YEARS appeared first on Security Boulevard. This article has been indexed from Security…
SpyAgent Malware Uses OCR Tech to Attack Crypto Wallets
Malware Using OCR to Steal Crypto Keys Cybersecurity experts have found a new malware threat that lures users into downloading a malicious app to grow. An advanced malware strain campaign has surfaced from North Korea, it attacks cryptocurrency wallets by…
Digital Dictatorship: The Dangers of Unchecked Spyware
The Pegasus scandal broke into the public eye three years ago and has been widely reported in the media ever since. Yet, the surveillance industry has not been fixed. On the contrary, the spyware problem seems to worsen as…
Quad7 Botnet Expands to Target SOHO Routers and VPN Appliances
The operators of the mysterious Quad7 botnet are actively evolving by compromising several brands of SOHO routers and VPN appliances by leveraging a combination of both known and unknown security flaws. Targets include devices from TP-LINK, Zyxel, Asus, Axentra, D-Link,…
Vulnerability in Acrobat Reader could lead to remote code execution; Microsoft patches information disclosure issue in Windows API
CVE-2024-38257 is considered “less likely” to be exploited, though it does not require any user interaction or user privileges. This article has been indexed from Cisco Talos Blog Read the original article: Vulnerability in Acrobat Reader could lead to remote…
Latest Cybersecurity News Headlines on Google
ICO and UK NCA Collaborate to Support Cyber Attack Victims The Information Commissioner’s Office (ICO) and the UK’s National Crime Agency (NCA) have entered into a Memorandum of Understanding (MOU) to enhance support for victims of cyberattacks. Under this agreement,…
Samsung India Workers Strike, Amid Report Of Overseas Job Cuts
Hundreds of Samsung workers in India continue their strike action over wage demands. Meanwhile report suggests heavy job layoffs This article has been indexed from Silicon UK Read the original article: Samsung India Workers Strike, Amid Report Of Overseas Job…