Europol Shuts Down 27 DDoS Attack Platform Providers, Admins Arrested
Law enforcement agencies worldwide have disrupted a holiday tradition of launching Distributed Denial-of-Service (DDoS) attacks in a major blow to cybercriminals.
As part of Operation...
Deloitte Hacked – Brain Cipher Ransomware Group Allegedly Stolen 1 TB of Data
Notorious ransomware group Brain Cipher has claimed to have breached Deloitte UK, allegedly exfiltrating over 1 terabyte of sensitive data from the professional services...
Isreali NSO Group’s Pegasus Spyware Detected in New Mobile Devices
Cybersecurity researchers from iVerify have revealed widespread new infections of the Pegasus spyware, developed by NSO Group (dubbed "Rainbow Ronin"), showing that spyware targets...
Microsoft Ignite 2024 live : Highlights From Threat Intelligence to AI Governance
AI transformation starts with security. This theme echoed throughout Microsoft Ignite 2024, with security discussions drawing large crowds and securing top spots in the...
Linux Kernel 6.13 Released – Avoiding Holiday Season Clash
In a rare occurrence, the Linux kernel development cycle has aligned favorably with the holiday season this year. Linus Torvalds, the creator and principal...
North Korean Hacking Group Launches Undected Malwareless URL Phishing Attacks
Researchers from South Korea have discovered that the notorious North Korean hacking group, known as Kimsuky, has adapted its phishing tactics to use malwareless...
“Rockstar 2FA” Phishing-as-a-Service Steals Microsoft 365 Credentials Via AiTM Attacks
Cybersecurity researchers have identified a concerning link between the advanced phishing toolkit known as 'Rockstar 2FA' and a surge in adversary-in-the-middle (AiTM) phishing attacks.
Highly...
InputSnatch – A Side-Channel Attack Allow Attackers Steal The Input Data From LLM Models
In a recent study, cybersecurity researchers have unveiled a new side-channel attack that threatens the privacy of users interacting with large language models (LLMs)....
Critical GPU DDK Vulnerabilities Allow Attackers to Execute Arbitrary Code in Physical Memory
A significant development for the tech community is the identification of 2 critical vulnerabilities in several versions of a widely-used GPU Driver Development Kit...
Why Cybersecurity Leaders Trust the MITRE ATT&CK Evaluations
In today’s rapidly evolving threat landscape, security leaders must make informed decisions to protect their organizations effectively.
The "MITRE Engenuity ATT&CK Evaluations: Enterprise" serve...










