In 2024, the cybersecurity landscape witnessed a staggering surge in exploited vulnerabilities. A total …
North Korean threat actors
-
-
Artificial intelligence in cybersecurityDigital Privacy
Meta Confirms Zero-Click WhatsApp Spyware Attack Targeting 90 Journalists, Activists
by Priya Kapoorby Priya Kapoor 2 minutes readMeta-owned WhatsApp made headlines recently after confirming a disturbing revelation: a zero-click spyware attack …
-
E-commerceIT securityTechnology Development
SquareX Discloses “Browser Syncjacking” New Technique That Provides Full Browser and Device Control, Putting Millions at Risk
by Nia Walkerby Nia Walker 2 minutes readIn a recent revelation that has sent shockwaves through the tech world, SquareX has …
-
3D printing technologyArtificial intelligence in cybersecurity
Researchers Uncover Lazarus Group Admin Layer for C2 Servers
by Nia Walkerby Nia Walker 2 minutes readIn a recent revelation that has sent shockwaves through the cybersecurity community, researchers have …
-
Artificial intelligence in cybersecurityTelecommunications
Mirai Variant ‘Aquabot’ Exploits Mitel Device Flaws
by Jamal Richaqrds 2 minutes readThe cybersecurity landscape is once again facing a new threat as a variant of …
-
AI in Retail IndustryArtificial intelligence in cybersecurity
UAC-0063 Expands Cyber Attacks to European Embassies Using Stolen Documents
by Nia Walkerby Nia Walker 2 minutes readIn the ever-evolving landscape of cybersecurity threats, the recent activities of the APT group …
-
AI TechnologyArtificial intelligence in cybersecurity
AI haters build tarpits to trap and trick AI scrapers that ignore robots.txt
by David Chenby David Chen 3 minutes readIn the ever-evolving landscape of cybersecurity, a new and intriguing development has emerged: AI …
-
Artificial intelligence in cybersecurityRetail Technology
Actively Exploited Fortinet Zero-Day Gives Attackers Super-Admin Privileges
by Priya Kapoorby Priya Kapoor 2 minutes readIn the fast-paced world of cybersecurity, staying ahead of threats is paramount. Recently, a …
-
Artificial intelligence in cybersecurityIT Infrastructure
Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations
by Nia Walkerby Nia Walker 2 minutes readIn a concerning development in the realm of cybersecurity, researchers have uncovered a disturbing …
-
3D printing technologyArtificial intelligence in cybersecurityEditing Software
Apple Patches Actively Exploited Zero-Day Vulnerability
by Lila Hernandez 1 minutes readApple’s recent iOS 18.3 update has made headlines for more than just its usual …