China Accuses U.S. of Decade-Long Cyber Espionage Campaign Against Huawei Servers

0
China's Ministry of State Security (MSS) has accused the U.S. of breaking into Huawei's servers, stealing critical data, and implanting backdoors since 2009, amid...

Cyber Group ‘Gold Melody’ Selling Compromised Access to Ransomware Attackers

0
A financially motivated threat actor has been outed as an initial access broker (IAB) that sells access to compromised organizations for other adversaries to conduct follow-on...

Financially Motivated UNC3944 Threat Actor Shifts Focus to Ransomware Attacks

0
The financially motivated threat actor known as UNC3944 is pivoting to ransomware deployment as part of an expansion to its monetization strategies, Mandiant has revealed. "UNC3944 has...

Due to violations regarding child data in the EU, TikTok faces...

0
Due to TikTok's handling of children's data, the Irish Data Protection Commission (DPC) fined the company €345 million (roughly $368 million). The investigation, which was...

Alert: New Kubernetes Vulnerabilities Enable Remote Attacks on Windows Endpoints

0
Three interrelated high-severity security flaws discovered in Kubernetes could be exploited to achieve remote code execution with elevated privileges on Windows endpoints within a...

Russian Journalist’s iPhone Compromised by NSO Group’s Zero-Click Spyware

0
The iPhone belonging to Galina Timchenko, a prominent Russian journalist and critic of the government, was compromised with NSO Group's Pegasus spyware, a new...

Mozilla Rushes to Patch WebP Critical Zero-Day Exploit in Firefox and...

0
Mozilla on Tuesday released security updates to resolve a critical zero-day vulnerability in Firefox and Thunderbird that has been actively exploited in the wild,...

Update Adobe Acrobat and Reader to Patch Actively Exploited Vulnerability.

0
Adobe's Patch Tuesday update for September 2023 comes with a patch for a critical actively exploited security flaw in Acrobat and Reader that could permit an...

How to Prevent API Breaches: A Guide to Robust Security

0
With the growing reliance on web applications and digital platforms, the use of application programming interfaces (APIs) has become increasingly popular. If you aren't...

Beware: MetaStealer Malware Targets Apple macOS in Recent Attacks

0
A new information stealer malware called MetaStealer has set its sights on Apple macOS, making the latest in a growing list of stealer families focused on...