09 December 2023

Cybercriminals target a private water scheme in the Erris area, impacting 180 homeowners, raising concerns about politically motivated cyber-attacks on critical infrastructure.


Researchers introduce TAP, an automated machine learning technique capable of exploiting vulnerabilities in large language models (LLMs), potentially producing harmful or toxic responses.


A newly identified technique utilizes Windows thread pools, employing a series of primitives for memory allocation and executing malicious code, bypassing major EDRs and posing new challenges in cybersecurity.


Speculation suggests a law enforcement operation might be behind the recent outage affecting ALPHV ransomware gang websites, potentially disrupting their operations.


Norton Healthcare in Kentucky confirms a data breach resulting from a May ransomware attack, exposing personal information of patients, employees, and their dependents, highlighting healthcare sector vulnerabilities.


Reports indicate elevation of privilege flaws as the primary vulnerability exploited by corporate insiders for unauthorized network activities, emphasizing the significance of securing privileged access.


Amazon's legal action targets a fraudulent refund scheme stealing millions of dollars in products from Amazon's platforms, showcasing the ongoing challenges in combating fraudulent activities online.


"5Ghoul" vulnerabilities in Qualcomm and MediaTek 5G modems affect over 710 5G smartphone models and devices, potentially exposing a wide range of users to security risks.



Newsletter

Subscribe to our newsletter to stay informed about CyberSecurity news. You can unsubscribe at any time.

More than Cyber Security

We offer a variety of services to help companies be prepared for real cyber-attacks.

Contact Us