US Sanctions Chinese Company for Supporting Flax Typhoon Hacker Group
On Friday, the U.S. Department of the Treasury announced sanctions against Integrity Technology Group, a Beijing-based cybersecurity firm accused of aiding a state-sponsored hacking collective known as Flax Typhoon.
The hackers allegedly leveraged Integrity Tech’s...
US Army Soldier Arrested For Selling Stolen Confidential Phone Records
Federal authorities have unsealed an indictment against a U.S. Army soldier, accusing him of selling and attempting to sell stolen confidential phone records.
Cameron John Wagenius, a 20-year-old soldier stationed at Fort Cavazos in Killeen,...
SysBumps – New Kernel Break Attack Bypassing macOS Systems Security
Security researchers have uncovered a novel attack targeting macOS systems running on Apple Silicon processors. Dubbed "SysBumps," this attack exploits speculative execution vulnerabilities in system calls to bypass kernel isolation and break Kernel Address...
Three Russian Nationals Charged for Espionage & Sabotage Activities
German authorities have charged three Russian-German nationals with espionage and sabotage activities aimed at undermining Germany's military support for Ukraine.
The Federal Prosecutor's Office filed charges against Dieter S., Alexander J., and Alex D. on...
Windows 11 BitLocker Encryption Bypassed To Extract Volume Encryption Keys
Researchers have demonstrated a method to bypass Windows 11's BitLocker encryption, enabling the extraction of Full Volume Encryption Keys (FVEKs) from memory.
This vulnerability underscores the risks associated with physical access attacks and highlights potential...
Top 10 Most Common Cyber Attacks of 2024
The year 2024 marked a pivotal moment in the ever-evolving realm of cybersecurity as cyberattacks became more frequent, sophisticated, and disruptive than ever before.
With the rapid adoption of digital transformation across industries and the...
EC2 Grouper Hackers Abusing AWS Tools to Attack With Compromised Credentials
A sophisticated hacker group dubbed "EC2 Grouper" has been exploiting AWS tools and compromised credentials to launch attacks on cloud environments.
This prolific threat actor has been observed in dozens of customer environments over...
Angular Expressions Vulnerability Let Attackers Gain Full System Access
A critical security vulnerability in Angular Expressions, a standalone module for the Angular.JS web framework, has been discovered, potentially allowing attackers to execute arbitrary code and gain full system access.
The vulnerability, identified as CVE-2024-54152,...
PoC Exploit Tool Released for Critical Windows LDAP Zero-click RCE Vulnerability
Researchers unveiled a proof-of-concept (PoC) exploit for a critical vulnerability in Windows Lightweight Directory Access Protocol (LDAP), tracked as CVE-2024-49112.
The flaw, disclosed by Microsoft on December 10, 2024, during its Patch Tuesday update, carries...
New Update – 35 Google Chrome Extensions Hacked to Inject Malicious Code
A massive phishing campaign has compromised at least 35 Google Chrome extensions, collectively used by approximately 2.6 million users, injecting malicious code to steal sensitive information from unsuspecting victims.
Early indicators suggest that the hackers...