HomeTopics 1

Topics 1

spot_imgspot_imgspot_imgspot_img

$27M Stolen in Penpie DeFi Hack: A Detailed Breakdown of the Attack and Lessons Learned

In a dramatic turn of events for the decentralized finance (DeFi) ecosystem, Penpie, a yield-boosting platform integrated with Pendle Finance, was exploited on September...

DPC Secures Suspension of X’s Personal Data Processing for AI Tool ‘Grok’ Training

In a landmark move, the Data Protection Commission (DPC) of Ireland has successfully secured an agreement with X (formerly known as Twitter) to halt...

Rocinante: The Banking Trojan Targeting Brazilian Android Devices Disguised as a Legitimate App

A new banking trojan, named Rocinante, is wreaking havoc on Brazilian Android users, disguising itself as a legitimate application while silently stealing sensitive data....

Atlassian Confluence Vulnerability Exploited in Crypto Mining Campaigns

A critical vulnerability in Atlassian Confluence, a popular collaboration software used by businesses worldwide, has been exploited by cybercriminals to launch cryptocurrency mining campaigns....

BlackByte Ransomware Gang Exploits VMware ESXi Flaw to Target Organizations

The notorious BlackByte ransomware group has been exploiting a critical vulnerability in VMware ESXi servers, identified as CVE-2024-37085, to launch a series of attacks...

Chinese Hackers Exploit Cisco Zero-Day to Deploy Custom Malware

In a recent cyberattack, a Chinese hacking group known as "Velvet Ant" has been linked to the exploitation of a critical zero-day vulnerability in...

Navigating The Mifare Backdoor: A Global Security Threat

A newly discovered backdoor vulnerability in Mifare smart cards, widely used in access control systems and contactless payments, has raised serious concerns about the...

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Must read

spot_imgspot_imgspot_imgspot_img