Security researchers have identified a set of malicious npm packages that were quietly stealing credentials, tokens, and browser data from all major operating systems, including…
General
Oracle EBS Hit by Zero-Day Data Exfiltration Attack Sticky
Hackers have exploited a zero-day vulnerability in Oracle E-Business Suite (EBS) as part of a large-scale extortion campaign linked to the Clop ransomware group,…
New UEFI Secure Boot Vulnerability Identified By Researchers
ESET researchers have reported a new vulnerability, referred to as a UEFI Secure Boot bypass, that can potentially affect Microsoft-signed applications. Known as CVE-2024-7344,…
8Base Ransomware Gang Escalates Double Extortion Attacks in June
In June, the 8Base ransomware gang has significantly intensified its double extortion attacks, posing a growing threat to organizations worldwide. There has been a…
AI-Generated Pentagon Explosion Hoax Sends Shockwaves on Twitter
A sensational and highly realistic hoax by AI-generated pentagon images portraying an explosion near the Pentagon. This has set Twitter ablaze, briefly causing a…
ScanSource Falls Victim to Ransomware Attack
Technology provider ScanSource recently announced that it had suffer a ransomware attack. It led to significant disruptions in its systems, business operations, and customer…
Microsoft and Citizen Lab Reveal Commercial Spyware on iPhones
Microsoft and Citizen Lab detected the utilization of commercial spyware created by Israel-based company QuaDream. It was targeting high-risk iPhones using a zero-click exploit…
New Dark Web Marketplace STYX Emerges as Hub for Cybercriminals
A new dark web marketplace, STYX, has been launched earlier this year. It offers a thriving hub for buying and selling illegal services or…
Emotet Malware Targets US Taxpayers with Phishing Campaign
Emotet malware, a notorious infection distributed through phishing emails, is targeting US taxpayers through a new phishing campaign. The campaign is impersonating W-9 tax…
Twitter’s internal source code leak
Twitter has taken down internal source code and tools that were leaked on GitHub for several months. The leaked code exposed proprietary source code…