ESET researchers have reported a new vulnerability, referred to as a UEFI Secure Boot bypass, that can potentially affect Microsoft-signed applications. Known as CVE-2024-7344,…
General
8Base Ransomware Gang Escalates Double Extortion Attacks in June
In June, the 8Base ransomware gang has significantly intensified its double extortion attacks, posing a growing threat to organizations worldwide. There has been a…
AI-Generated Pentagon Explosion Hoax Sends Shockwaves on Twitter
A sensational and highly realistic hoax by AI-generated pentagon images portraying an explosion near the Pentagon. This has set Twitter ablaze, briefly causing a…
ScanSource Falls Victim to Ransomware Attack
Technology provider ScanSource recently announced that it had suffer a ransomware attack. It led to significant disruptions in its systems, business operations, and customer…
Microsoft and Citizen Lab Reveal Commercial Spyware on iPhones
Microsoft and Citizen Lab detected the utilization of commercial spyware created by Israel-based company QuaDream. It was targeting high-risk iPhones using a zero-click exploit…
New Dark Web Marketplace STYX Emerges as Hub for Cybercriminals
A new dark web marketplace, STYX, has been launched earlier this year. It offers a thriving hub for buying and selling illegal services or…
Emotet Malware Targets US Taxpayers with Phishing Campaign
Emotet malware, a notorious infection distributed through phishing emails, is targeting US taxpayers through a new phishing campaign. The campaign is impersonating W-9 tax…
Twitter’s internal source code leak
Twitter has taken down internal source code and tools that were leaked on GitHub for several months. The leaked code exposed proprietary source code…
Healthcare behemoth CHS reveals the first intrusion with GoAnywhere.
According to Community Health Systems (CHS Healthcare), a recent wave of attacks aimed at a zero-day vulnerability in Fortra’s GoAnywhere MFT secure data transfer…
The US National Cyber Security Strategy to Stress Privacy
The Biden administration plans to implement a national cybersecurity strategy. This will require comprehensive regulation of the country’s critical infrastructure. This will help to…