Google Threat Intelligence Group (GTIG) has uncovered a multifaceted cyber espionage operation attributed to the PRC-nexus threat actor UNC6384, believed to be associated with TEMP.Hex […]
Category: Cyber Security News
Maryland Transportation Systems Disrupted Following Cyberattack
Maryland’s transit network experienced widespread disruption this week after a sophisticated cyberattack targeted critical information systems, forcing the Maryland Transit Administration (MTA) and the Department […]
HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands
Cybersecurity researchers have discovered a new variant of an Android banking trojan called HOOK that features ransomware-style overlay screens to display extortion messages. “A prominent […]
X/Twitter Found to Be Most Aggressive Social Media App in Tracking User Location Data
A comprehensive study examining the location data practices of the top 10 social media platforms has uncovered concerning patterns of user tracking that extend far […]
Shadow AI is surging — getting AI adoption right is your best defense
AI adoption in the enterprise is no longer theoretical. It is already happening, whether organizations are ready or not. Employees are using publicly available AI […]
Behind the Coinbase breach: Bribery emerges as enterprise threat
On May 11, cryptocurrency exchange giant Coinbase “received an email communication from an unknown threat actor claiming to have obtained information about certain Coinbase customer […]
Das kostet ein Data Breach 2025
width=”2028″ height=”1141″ sizes=”auto, (max-width: 2028px) 100vw, 2028px”>Laut einer aktuellen Studie liegen die durchschnittlichen Kosten einer Datenpanne in Deutschland bei 3,87 Millionen Euro. photoschmidt – shutterstock.com […]
French Retailer Auchan Hit by Cyberattack, Customer Data Compromised
French retail giant Auchan announced on August 21 that it fell victim to a cyberattack that resulted in the theft of loyalty account information belonging to several hundred […]
Google to Verify All Android Developers in 4 Countries to Block Malicious Apps
Google has announced plans to begin verifying the identity of all developers who distribute apps on Android, even for those who distribute their software outside […]
CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws impacting Citrix Session Recording and Git to its Known Exploited Vulnerabilities […]