Hacker ‘IntelBroker’ Indicted in the United States for International Data Theft Violations
A British national, known online as “IntelBroker,” has been indicted in the United States for the global theft and sale of sensitive data, allegedly causing damages estimated at $25…
A British national, known online as “IntelBroker,” has been indicted in the United States for the global theft and sale of sensitive data, allegedly causing damages estimated at $25…
Exploitation of Open-Source Tools by Cyber Criminals Targeting Financial Institutions Throughout Africa
Cybersecurity researchers have reported a series of cyber attacks targeting financial organizations across Africa since July 2023, utilizing a combination of open-source and publicly accessible tools to maintain persistent…
Cybersecurity researchers have reported a series of cyber attacks targeting financial organizations across Africa since July 2023, utilizing a combination of open-source and publicly accessible tools to maintain persistent…
French Authorities Apprehend Four Individuals Linked to Notorious BreachForums
Four individuals in their twenties have been apprehended in France due to their alleged involvement with the notorious dark web forum, BreachForums.
On June 25, Laure Beccuau, a State…
Four individuals in their twenties have been apprehended in France due to their alleged involvement with the notorious dark web forum, BreachForums.
On June 25, Laure Beccuau, a State…
Former Student Indicted for Series of Cyber Attacks Against Sydney University
A former student has been charged in connection with multiple cyber attacks on a university in Sydney, impacting hundreds of staff and students. Since 2021, Western Sydney University faced…
A former student has been charged in connection with multiple cyber attacks on a university in Sydney, impacting hundreds of staff and students. Since 2021, Western Sydney University faced…
BreachForums: Arrest of ShinyHunters Members and Identification of IntelBroker as Kai West
Four individuals believed to be associated with the ShinyHunters hacking group have been arrested in a coordinated international law enforcement operation. Among those identified is Kai West, a British…
Four individuals believed to be associated with the ShinyHunters hacking group have been arrested in a coordinated international law enforcement operation. Among those identified is Kai West, a British…
Exploited Artificial Intelligences: Facilitating the Advancement of Cybercriminal Expertise
Cybercriminals are increasingly circumventing the protective measures designed to prevent AI models from being exploited for illicit activities, according to recent research.
The misuse of AI technologies by criminal…
Cybercriminals are increasingly circumventing the protective measures designed to prevent AI models from being exploited for illicit activities, according to recent research.
The misuse of AI technologies by criminal…
Cisco Issues Urgent Alert on Critical RCE Vulnerabilities in Identity Services Engine
Cisco has issued a security advisory regarding two critical, unauthenticated remote code execution (RCE) vulnerabilities affecting the Cisco Identity Services Engine (ISE) and the Passive Identity Connector (ISE-PIC).
The…
Cisco has issued a security advisory regarding two critical, unauthenticated remote code execution (RCE) vulnerabilities affecting the Cisco Identity Services Engine (ISE) and the Passive Identity Connector (ISE-PIC).
The…
Significant Vulnerability in Open VSX Registry Poses Risk of Supply Chain Attacks for Millions of Developers
Cybersecurity researchers have identified a significant vulnerability in the Open VSX Registry (open-vsx.org), which, if successfully exploited, could allow attackers to gain control over the entire Visual Studio Code…
Cybersecurity researchers have identified a significant vulnerability in the Open VSX Registry (open-vsx.org), which, if successfully exploited, could allow attackers to gain control over the entire Visual Studio Code…
Hundreds of MCP Servers Vulnerable to Remote Code Execution and Data Exposure
A growing number of Model Context Protocol (MCP) servers, which are linked to artificial intelligence, have been identified as misconfigured and vulnerable to significant security threats. Recent research reveals…
A growing number of Model Context Protocol (MCP) servers, which are linked to artificial intelligence, have been identified as misconfigured and vulnerable to significant security threats. Recent research reveals…
Preventive Detention of Cyber Offenders: Supreme Court of Tamil Nadu Approves Measures to Mitigate Cybercrime Risks
The Supreme Court has affirmed the Tamil Nadu government’s initiative to implement preventive detention laws targeting cybercriminals. Justices Sandeep Mehta and Joymalya Bagchi described this action as a commendable…
The Supreme Court has affirmed the Tamil Nadu government’s initiative to implement preventive detention laws targeting cybercriminals. Justices Sandeep Mehta and Joymalya Bagchi described this action as a commendable…
Flowable Recognized in the Latest Gartner® Market Guide for Business Process Automation Tools
Zurich-based automation platform Flowable has been recognized as a Representative Vendor in the latest Gartner report on business process automation platforms. This recognition underscores Flowable’s commitment to providing advanced…
Zurich-based automation platform Flowable has been recognized as a Representative Vendor in the latest Gartner report on business process automation platforms. This recognition underscores Flowable’s commitment to providing advanced…
The Ineffectiveness of the Do Not Call Registry in Contemporary Telecommunication Privacy
The Do Not Call Registry has faced significant criticism online for its ineffectiveness in preventing unsolicited calls. Many users express frustration over the continued receipt of telemarketing calls despite…
The Do Not Call Registry has faced significant criticism online for its ineffectiveness in preventing unsolicited calls. Many users express frustration over the continued receipt of telemarketing calls despite…
FTC Authorizes $126 Million in Refunds for Fortnite Due to Manipulative Design Practices
The Federal Trade Commission (FTC) has sanctioned $126 million in refunds to be disbursed to 969,173 Fortnite players, following a settlement concerning allegations against Epic Games for utilizing manipulative…
The Federal Trade Commission (FTC) has sanctioned $126 million in refunds to be disbursed to 969,173 Fortnite players, following a settlement concerning allegations against Epic Games for utilizing manipulative…
Severe Remote Code Execution Vulnerabilities in Cisco ISE and ISE-PIC Enable Unauthenticated Access to Root Privileges
Cisco has released updates to address two critical-severity security vulnerabilities in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC), which could allow unauthenticated attackers to execute…
Cisco has released updates to address two critical-severity security vulnerabilities in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC), which could allow unauthenticated attackers to execute…
Patient Death Associated with NHS Cyber-Attack
A patient’s death has been officially attributed to the ransomware attack on Synnovis, the pathology services provider for multiple NHS hospitals in London, which occurred in 2024. This cyber…
A patient’s death has been officially attributed to the ransomware attack on Synnovis, the pathology services provider for multiple NHS hospitals in London, which occurred in 2024. This cyber…
Columbia University Computer Systems Compromised by Potential Cyberattack
A potential cyberattack has led to extensive computer system outages at Columbia University for a second consecutive day. As of Wednesday, the university’s engineering team has been diligently investigating…
A potential cyberattack has led to extensive computer system outages at Columbia University for a second consecutive day. As of Wednesday, the university’s engineering team has been diligently investigating…
The Role of Email, Cryptocurrency Wallets, and YouTube Activity in Uncovering IntelBroker to the FBI
The Federal Bureau of Investigation (FBI) conducted a thorough investigation into the activities of IntelBroker, a prominent figure operating under the alias Kai West in the United Kingdom. Utilizing…
The Federal Bureau of Investigation (FBI) conducted a thorough investigation into the activities of IntelBroker, a prominent figure operating under the alias Kai West in the United Kingdom. Utilizing…
Ahold Delhaize Reports Data Breach Impacting 2.2 Million Individuals
Ahold Delhaize, a prominent global food retail chain, has alerted over 2.2 million individuals regarding the unauthorized access and theft of their personal, financial, and health information due to…
Ahold Delhaize, a prominent global food retail chain, has alerted over 2.2 million individuals regarding the unauthorized access and theft of their personal, financial, and health information due to…
Analysis of PUBLOAD and Pubshell Malware in Mustang Panda’s Targeted Operations against Tibet
A China-linked threat actor, identified as Mustang Panda, has launched a new cyber espionage campaign targeting the Tibetan community.
The spear-phishing attacks exploit topics pertinent to Tibet, including the…
A China-linked threat actor, identified as Mustang Panda, has launched a new cyber espionage campaign targeting the Tibetan community.
The spear-phishing attacks exploit topics pertinent to Tibet, including the…
Hawaiian Airlines Experiences Cybersecurity Incident
Hawaiian Airlines has recently experienced a cybersecurity incident that has affected some of its IT systems. The airline officially acknowledged this “cybersecurity event” through two updates on its website…
Hawaiian Airlines has recently experienced a cybersecurity incident that has affected some of its IT systems. The airline officially acknowledged this “cybersecurity event” through two updates on its website…