Home Cyber Threat News

Cyber Threat News

Stay informed about the latest cybersecurity challenges with our Cyber Threat News category. From ransomware attacks and phishing scams to advanced persistent threats (APTs), we provide up-to-date insights on the most pressing cyber risks affecting individuals and businesses.

Our expert analyses cover how these threats evolve, who they target, and what steps you can take to safeguard your data. Whether it’s breaking news on global cyber incidents or trends shaping the future of cybersecurity, you’ll find it here.

T-Mobile Spotted Chinese Salt Typhoon Hackers Attacking Its Routers

T-Mobile Spotted Chinese Salt Typhoon Hackers Attacking Its Routers

T-Mobile revealed how it successfully blocked attempts by the Chinese hacking group Salt Typhoon to infiltrate its network. This announcement follows reports from earlier this month about Salt Typhoon's successful breaches of wiretap systems managed...
Cyber Threats of 2024

Top Sophisticated Cyber Security Threats of 2024

As 2024 concludes, cybersecurity experts are reflecting on an eventful Q4 that witnessed evolving threats and heightened activity in the malware landscape. ANY.RUN, a leading interactive malware analysis platform, has released its quarterly report, shedding...
Hackers Can Exploit Windows Driver Use-After-Free Vulnerability (CVE-2024-38193) to Gain Systems Privileges

Hackers Can Exploit Windows Driver Use-After-Free Vulnerability (CVE-2024-38193) to Gain Systems Privileges

A critical use-after-free vulnerability called CVE-2024-38193 is found in the Windows driver afd.sys. It affects the Registered I/O (RIO) extension for Windows sockets and lets attachers take over the whole system remotely. The August...
Teaching AI to Hack

Teaching AI to Hack: Researchers Demonstrate ChatGPT’s to Ethically Hack Linux & Windows

In a new study released today, researchers have demonstrated the significant potential of artificial intelligence (AI) in enhancing ethical hacking practices, particularly in Linux environments. The study, conducted by Haitham S. Al-Sinani from the...
Microsoft Ignite 2024

Microsoft Ignite 2024 live : Highlights From Threat Intelligence to AI Governance

AI transformation starts with security. This theme echoed throughout Microsoft Ignite 2024, with security discussions drawing large crowds and securing top spots in the conference's most-attended sessions. Hundreds of security and IT professionals gathered early...
GitHub Copilot for Azure Simplifies Deployment of ASP.NET Core Web API

GitHub Copilot for Azure Simplifies Deployment of ASP.NET Core Web API

In an era where cloud deployment is becoming a necessity for developers, GitHub Copilot for Azure is transforming how developers approach the process. This innovative tool acts as a virtual pair programmer, providing conversational...
Deloitte Hacked

Deloitte Hacked – Brain Cipher Ransomware Group Allegedly Stolen 1 TB of Data

Notorious ransomware group Brain Cipher has claimed to have breached Deloitte UK, allegedly exfiltrating over 1 terabyte of sensitive data from the professional services giant. Brain Cipher is a ransomware group that emerged in June...
InputSnatch Side-Channel Attack

InputSnatch – A Side-Channel Attack Allow Attackers Steal The Input Data From LLM Models

In a recent study, cybersecurity researchers have unveiled a new side-channel attack that threatens the privacy of users interacting with large language models (LLMs). The attack, dubbed "InputSnatch," exploits timing differences in cache-sharing mechanisms...
North Korean Hackers Attacking Developers With A Weaponized JavaScript Projects

North Korean Hackers Attacking Developers With A Weaponized JavaScript Projects

North Korean threat actors target software developers with weaponized Javascript projects that include BeaverTail malware deployed via NPM packages. It is intended to steal information and load additional stages of malware, notably a multi-stage Python-based...
New Skimmer Malware Steals Credit Card Data From Checkout Pages

New Skimmer Malware Steals Credit Card Data From Checkout Pages

A new skimmer malware is targeting Magento-powered eCommerce websites, stealing sensitive credit card information from checkout pages.  This malware dynamically creates a false credit card form or directly extracts payment fields, activating only on checkout...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...