In a world where threats are persistent, the modern CISO’s real job isn’t just to secure technology—it’s to preserve institutional trust and ensure business continuity. […]
Author: cyberbytes
6 Browser-Based Attacks Security Teams Need to Prepare For Right Now
Attacks that target users in their web browsers have seen an unprecedented rise in recent years. In this article, we’ll explore what a “browser-based attack” […]
New ransomware Yurei adopts open-source tools for double-extortion campaigns
A new ransomware group called Yurei has surfaced, adopting a double-extortion model. The group encrypts the victim’s files, exfiltrates sensitive data, and demands a ransomware […]
Burger King Uses DMCA to Remove Blog Exposing Drive-Thru System Security Flaws
Burger King has invoked the Digital Millennium Copyright Act to force the removal of a security researcher’s blog post that disclosed serious vulnerabilities in its […]
Scattered Spider’s ‘retirement’ announcement: genuine exit or elaborate smokescreen?
Nearly 15 ransomware and cybercrime groups, led by the notorious Scattered Spider collective, announced their retirement in a dramatic farewell letter that cybersecurity experts believe […]
Red AI Range: Advanced AI Tool for Identifying and Mitigating Security Flaws
Red AI Range (RAR) offers a turnkey platform for AI red teaming and vulnerability assessment, enabling security professionals to simulate realistic attack scenarios, uncover weaknesses, […]
Samsung’s image library flaw opens a zero-click backdoor
Samsung has disclosed a serious vulnerability affecting a core utility within its Android devices, one that has already been exploited in zero-day attacks. The flaw […]
Pro-Russian Hackers Target Critical Industries Across the Globe
In 2024, as the Russia-Ukraine war prolongs and military and economic cooperation between North Korea and Russia deepens, cyberspace has emerged as a central battleground […]
IBM QRadar SIEM Vulnerability Allows Unauthorized Actions by Attackers
A permissions issue in IBM QRadar SIEM could enable local privileged users to modify configuration files without proper authorization. Tracked as CVE-2025-0164, this flaw stems […]
Hackers using generative AI “ChatGPT” to evade anti-virus defenses
The Kimsuky APT group has begun leveraging generative AI ChatGPT to craft deepfake South Korean military agency ID cards. Phishing lures deliver batch files and […]