• Fri. Oct 13th, 2023

Month: May 2023

  • Home
  • Authorities Provided Rare Insight on Information Sharing to Protect US Networks From Malicious Hackers

Authorities Provided Rare Insight on Information Sharing to Protect US Networks From Malicious Hackers

The officials revealed that collaboration between the Cybersecurity and Infrastructure Security Agency (CISA) and the U.S. Cyber Command helped to prevent harmful cyberattacks. At the 2023 RSA Conference, officials from…

DeFi Lending Protocol on Bitcoin Network Steals $1 Million from Customers

A DeFi lending protocol running on the Bitcoin network, known as Ordinals Finance, reportedly stole $1 million from its customers before deleting all of its social media pages. The fraudulent…

Cyber Attack on a US railroad company Poses a Threat to the Security of the Country’s Transportation System

The company has been working to safeguard the critical infrastructure of the United States against this attack. The Alaska Railroad Corporation (ARRC), a transportation company in Alaska, recently suffered a…

Hackers of Tomiris Gang Are Collecting Intelligence in CIS Countries

A group of hackers going by the name Tomitis was considered a serious threat when it was found out they are secretly collecting the intelligence in Central Asia. The report…

British Father of Three Spied on Women Online by Hacking their Webcams

A British hacker left hundreds of women terrified after it was found out that he spied on unsuspecting strangers while they were doing their daily routine. Christopher Taylor, a resident…

DHS will use AI to monitor drug dealers

A special task force intends to use AI to investigate crimes and protect critical infrastructure. U.S. law enforcers are to use artificial intelligence to counter cyber threats and investigate and…

Malware Multitool EvilExtractor Sold in Dark Web For Just a Couple Dozen Dollars

The powerful data-stealing tool has already been used in a number of cyberattacks. Fortinet security researchers have reported the discovery of a powerful new malware named EvilExtractor. The vendor is…

Experts From Infoblox Identified Decoy Dog, a Threat Actor that Was Active the Whole Year

A strong possibility arises to spot emerging cybercriminal techniques by analyzing DNS inquiries. Security experts Infobloxwas found a new bundle of business malware called “Decoy Dog” after conducting another examination…

Russian Hackers are Accused of Regularly Exploiting Unprotected PaperCut Networks

A further flaw in a widely used program puts tens of thousands of companies in danger. Using vulnerability reports from the firm Trend Micro, PaperCut, a vendor of copy management…

Hackers can conceal dangerous apps in the Google Cloud Platform by using “Ghost tokens”

Even seasoned cybersecurity specialists can become confused by the “GhostToken” vulnerability’s abuse. Information on a newly resolved zero-day vulnerability in the Google Cloud Platform (GCP) has been made public by…