Security

Arkansas City water treatment facility switched to manual operations following a cyberattack

Arkansas City, a small city in Cowley County, Kansas, was forced to switch its water treatment facility to manual operations…

3 weeks ago

A generative artificial intelligence malware used in phishing attacks

HP researchers detected a dropper that was generated by generative artificial intelligence services and used to deliver AsyncRAT malware. While investigating…

3 weeks ago

A cyberattack on MoneyGram caused its service outage

American peer-to-peer payments and money transfer company MoneyGram confirmed that a cyberattack caused its service outage. American interstate and international peer-to-peer payments and money transfer company MoneyGram…

3 weeks ago

Telegram will provide user data to law enforcement in response to legal requests

Telegram will provide user data to law enforcement agencies in response to valid legal requests, according to a recent policy…

3 weeks ago

ESET fixed two privilege escalation flaws in its products

ESET addressed two local privilege escalation vulnerabilities in security products for Windows and macOS operating systems. Cybersecurity firm ESET released…

3 weeks ago

Noise Storms: Mysterious massive waves of spoofed traffic observed since 2020

GreyNoise Intelligence firm warns of a mysterious phenomenon observed since January 2020, massive waves of spoofed traffic called Noise Storms. …

4 weeks ago

Hackers stole over $44 million from Asian crypto platform BingX

Cybercriminals stole more than $44 million worth of cryptocurrency from the Singaporean crypto platform BingX. Singaporean crypto platform BingX reported…

4 weeks ago

Tor Project responded to claims that law enforcement can de-anonymize Tor users

The maintainers of the Tor Project have responded to claims that German police have devised a technique to deanonymize users.…

4 weeks ago

UNC1860 provides Iran-linked APTs with access to Middle Eastern networks

Iran-linked APT group UNC1860 is operating as an initial access facilitator that provides remote access to Middle Eastern Networks. Mandiant…

4 weeks ago

U.S. CISA adds new Ivanti Cloud Services Appliance Vulnerability to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Ivanti Cloud Services Appliance Vulnerability to its Known Exploited Vulnerabilities catalog. The…

4 weeks ago

This website uses cookies.