-

Microsoft, Meta, and DOJ Disrupt Global Cybercrime and Fraudulent Networks
Microsoft, Meta, and DOJ Disrupt Global Cybercrime and Fraudulent Networks Meta Platforms, Microsoft, and the U.S. Department of Justice (DoJ)…
-

Chinese hackers target Linux with new WolfsBane malware
Chinese hackers target Linux with new WolfsBane malware A new Linux backdoor called ‘WolfsBane’ has been discovered, believed to be…
-

Fintech giant Finastra investigates data breach after SFTP hack
Fintech giant Finastra investigates data breach after SFTP hack Finastra has confirmed it warned customers of a cybersecurity incident after…
-

Cyberattack at French hospital exposes health data of 750,000 patients
Cyberattack at French hospital exposes health data of 750,000 patients A data breach at an unnamed French hospital exposed the…
-

Sen. Blumenthal wants FCC to get busy on telecom wiretap security rules
Sen. Blumenthal wants FCC to get busy on telecom wiretap security rules Sen. Blumenthal wants FCC to get busy on…
-

Why Italy Sells So Much Spyware
Why Italy Sells So Much Spyware Why Italy Sells So Much Spyware Interesting analysis: Although much attention is given to…
-

Detecting the Presence of a Debugger in Linux, (Tue, Nov 19th)
Detecting the Presence of a Debugger in Linux, (Tue, Nov 19th) Hello from Singapore where I’m with Johannes and Yee! This week, I’m…
-

T-Mobile confirms it was hacked in recent wave of telecom breaches
T-Mobile confirms it was hacked in recent wave of telecom breaches T-Mobile confirms it was hacked in the wave of…
-

Fake AI video generators infect Windows, macOS with infostealers
Fake AI video generators infect Windows, macOS with infostealers Fake AI image and video generators infect Windows and macOS with…
-

NSO Group used another WhatsApp zero-day after being sued, court docs say
NSO Group used another WhatsApp zero-day after being sued, court docs say Israeli surveillance firm NSO Group reportedly used multiple…
