Computer Security News

Stay informed on the latest in computer security with our dedicated news category. From new malware threats and data breaches to software vulnerabilities and security patches, we cover everything you need to know to stay protected in a rapidly changing digital landscape.

Our expert-driven insights break down complex issues into actionable advice, helping businesses and individuals safeguard their systems. Explore weekly recaps, in-depth threat analyses, and real-time updates on critical security developments.

US Sanctions Chinese Company

US Sanctions Chinese Company for Supporting Flax Typhoon Hacker Group

On Friday, the U.S. Department of the Treasury announced sanctions against Integrity Technology Group, a Beijing-based cybersecurity firm accused of aiding a state-sponsored hacking collective known as Flax Typhoon. The hackers allegedly leveraged Integrity Tech’s...
US Army Soldier Arrested For Selling Stolen Confidential Phone Records

US Army Soldier Arrested For Selling Stolen Confidential Phone Records

Federal authorities have unsealed an indictment against a U.S. Army soldier, accusing him of selling and attempting to sell stolen confidential phone records. Cameron John Wagenius, a 20-year-old soldier stationed at Fort Cavazos in Killeen,...
SysBumps

SysBumps – New Kernel Break Attack Bypassing macOS Systems Security

Security researchers have uncovered a novel attack targeting macOS systems running on Apple Silicon processors. Dubbed "SysBumps," this attack exploits speculative execution vulnerabilities in system calls to bypass kernel isolation and break Kernel Address...
Three Russian Nationals Charged for Espionage & Sabotage Activities

Three Russian Nationals Charged for Espionage & Sabotage Activities

German authorities have charged three Russian-German nationals with espionage and sabotage activities aimed at undermining Germany's military support for Ukraine. The Federal Prosecutor's Office filed charges against Dieter S., Alexander J., and Alex D. on...
Windows 11 BitLocker Encryption Bypassed To Extract Volume Encryption Keys

Windows 11 BitLocker Encryption Bypassed To Extract Volume Encryption Keys

Researchers have demonstrated a method to bypass Windows 11's BitLocker encryption, enabling the extraction of Full Volume Encryption Keys (FVEKs) from memory. This vulnerability underscores the risks associated with physical access attacks and highlights potential...
Top 10 Most Common Cyber Attacks of 2024

Top 10 Most Common Cyber Attacks of 2024

The year 2024 marked a pivotal moment in the ever-evolving realm of cybersecurity as cyberattacks became more frequent, sophisticated, and disruptive than ever before. With the rapid adoption of digital transformation across industries and the...
EC2 Grouper Hackers Abusing AWS Tools to Attack With Compromised Credentials

EC2 Grouper Hackers Abusing AWS Tools to Attack With Compromised Credentials

A sophisticated hacker group dubbed "EC2 Grouper" has been exploiting AWS tools and compromised credentials to launch attacks on cloud environments. This prolific threat actor has been observed in dozens of customer environments over...
Angular Expressions Vulnerability

Angular Expressions Vulnerability Let Attackers Gain Full System Access

A critical security vulnerability in Angular Expressions, a standalone module for the Angular.JS web framework, has been discovered, potentially allowing attackers to execute arbitrary code and gain full system access. The vulnerability, identified as CVE-2024-54152,...
PoC Exploit Tool Released for Critical Windows LDAP Zero-click RCE Vulnerability

PoC Exploit Tool Released for Critical Windows LDAP Zero-click RCE Vulnerability

Researchers unveiled a proof-of-concept (PoC) exploit for a critical vulnerability in Windows Lightweight Directory Access Protocol (LDAP), tracked as CVE-2024-49112. The flaw, disclosed by Microsoft on December 10, 2024, during its Patch Tuesday update, carries...
35 Google Chrome Extensions Hacked

New Update – 35 Google Chrome Extensions Hacked to Inject Malicious Code

A massive phishing campaign has compromised at least 35 Google Chrome extensions, collectively used by approximately 2.6 million users, injecting malicious code to steal sensitive information from unsuspecting victims. Early indicators suggest that the hackers...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...