HomeTopics 1

Topics 1

spot_imgspot_imgspot_imgspot_img

Deepfakes on the Move: Chinese Hackers Leveraging New Threat in Mobile Banking Attacks

A recent report by Group-IB, a cybersecurity firm, sheds light on a concerning trend: Chinese cybercriminals utilizing deepfake technology in advanced mobile banking malware...

Unveiling the Million Dollar Bugs: Top Bug Bounties Awarded in 2023

Bug bounty programs reward ethical hackers for discovering and responsibly reporting vulnerabilities in software and systems. These programs play a vital role in bolstering...

Bank of America Customers Affected by Data Breach at Infosys McCamish Systems

Bank of America customers are being notified of a recent data breach involving Infosys McCamish Systems, a provider of services for deferred compensation plans....

Cracked but Not Conquering: Decoded Rhysida Ransomware Highlights Challenges and Opportunities

A beacon of hope emerged recently in the fight against ransomware, with researchers from Kookmin University and the Korea Internet & Security Agency (KISA)...

Building Trust in the Code: CISA and OpenSSF Collaborate on Package Repository Security Principles

The Cybersecurity and Infrastructure Security Agency (CISA) recently joined forces with the Open Source Security Foundation (OpenSSF) Securing Software Repositories Working Group to release...

Flipping the Script: Canada’s Proposed Flipper Zero Ban Sparks Debate on Security and Technology

Canada's recent proposal to ban the Flipper Zero, a multi-functional hacking tool, has ignited a heated debate within the cybersecurity community. The move, aimed...

Cloud Under Siege: Ongoing Azure Compromises Target Senior Execs, Microsoft 365 Apps

Cybersecurity alarm bells are ringing as attackers continue to exploit vulnerabilities in Microsoft Azure cloud environments, specifically targeting senior executives' accounts and Microsoft 365...

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Must read

spot_imgspot_imgspot_imgspot_img