Cyber Threat News

Stay informed about the latest cybersecurity challenges with our Cyber Threat News category. From ransomware attacks and phishing scams to advanced persistent threats (APTs), we provide up-to-date insights on the most pressing cyber risks affecting individuals and businesses.

Our expert analyses cover how these threats evolve, who they target, and what steps you can take to safeguard your data. Whether it’s breaking news on global cyber incidents or trends shaping the future of cybersecurity, you’ll find it here.

Microsoft Ignite 2024

Microsoft Ignite 2024 live : Highlights From Threat Intelligence to AI Governance

AI transformation starts with security. This theme echoed throughout Microsoft Ignite 2024, with security discussions drawing large crowds and securing top spots in the conference's most-attended sessions. Hundreds of security and IT professionals gathered early...
Hackers Exploited Windows Event Logs Tool

Hackers Exploited Windows Event Logging Tool To Steal Data Secretly

Wevtutil.exe, a Windows event log utility, can be used maliciously in Living Off the Land (LOLBAS) to export logs for exfiltration, query specific event data, or clear logs. Attackers increasingly use Living Off the Land...
GitHub Copilot for Azure Simplifies Deployment of ASP.NET Core Web API

GitHub Copilot for Azure Simplifies Deployment of ASP.NET Core Web API

In an era where cloud deployment is becoming a necessity for developers, GitHub Copilot for Azure is transforming how developers approach the process. This innovative tool acts as a virtual pair programmer, providing conversational...
Linux Kernel 6.13

Linux Kernel 6.13 Released – Avoiding Holiday Season Clash

In a rare occurrence, the Linux kernel development cycle has aligned favorably with the holiday season this year. Linus Torvalds, the creator and principal developer of the Linux kernel, announced the release of Linux...
MediaTek Bluetooth Chipset Vulnerabilities

Critical MediaTek Bluetooth Chipset Vulnerabilities Impacted 1.5 Billion+ Android Users

A series of security vulnerabilities have been identified in MediaTek chipsets, affecting several Android versions and other related software platforms. MediaTek leads the market in powering Android tablets and smart-feature phones and ranks as...
North Korean Hacking Group Launches Undected Malwareless URL Phishing Attacks

North Korean Hacking Group Launches Undected Malwareless URL Phishing Attacks

Researchers from South Korea have discovered that the notorious North Korean hacking group, known as Kimsuky, has adapted its phishing tactics to use malwareless phishing attack tactics, which evade major EDR detection. The group, which...
Weekly Cybersecurity Newsletter

Weekly Cybersecurity Newsletter: Data Breaches, Vulnerabilities, Cyber Attacks, & Other Updates

Welcome to this week’s Cybersecurity Newsletter, where we delve into the latest advancements and critical updates in the cybersecurity landscape. This issue focuses on emerging threats and the current state of defenses in our rapidly...
Rockstar 2FA

“Rockstar 2FA” Phishing-as-a-Service Steals Microsoft 365 Credentials Via AiTM Attacks

Cybersecurity researchers have identified a concerning link between the advanced phishing toolkit known as 'Rockstar 2FA' and a surge in adversary-in-the-middle (AiTM) phishing attacks. Highly advanced methods are used in these campaigns to trick people...
InputSnatch Side-Channel Attack

InputSnatch – A Side-Channel Attack Allow Attackers Steal The Input Data From LLM Models

In a recent study, cybersecurity researchers have unveiled a new side-channel attack that threatens the privacy of users interacting with large language models (LLMs). The attack, dubbed "InputSnatch," exploits timing differences in cache-sharing mechanisms...
GPU DDK Vulnerabilities

Critical GPU DDK Vulnerabilities Allow Attackers to Execute Arbitrary Code in Physical Memory

A significant development for the tech community is the identification of 2 critical vulnerabilities in several versions of a widely-used GPU Driver Development Kit (DDK) that affect systems using Unified Memory Architecture (UMA). On...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...