Attackers are increasingly sophisticated in their methods to harvest credentials, employing a range of tactics that include the use of QR codes, fake CAPTCHA...
Socket Acquires Secure Annex: Enhancing Supply Chain Visibility through Expanded Security Measures
In a significant move aimed at bolstering its security offerings, Socket has acquired Secure Annex, a startup specializing in extension security. This acquisition is spearheaded by Feross Aboukhadijeh, the founder and CEO of...
Attackers are increasingly sophisticated in their methods to harvest credentials, employing a range of tactics that include the use of QR codes, fake CAPTCHA...
European Police Strike Major Blow Against Online Fraud Operations
In a significant move in the ongoing struggle against online fraud, European law enforcement agencies have...
Shared Systems Under ‘Extreme Risk’ Due to Newly Discovered Exploit
Recent developments in cybersecurity have revealed a significant vulnerability affecting multiple Linux distributions, including Ubuntu, Amazon Linux, Red Hat Enterprise Linux (RHEL), and SUSE Linux. The exploit, identified by Theori, poses a serious threat, particularly...
Three Arrested for Hacking Over 610,000 Roblox Accounts in Ukraine
In a significant development, Ukrainian authorities have arrested three individuals in connection with the hacking...
Microsoft 365 Mailbox Rules Misused for Data Exfiltration and Persistence: A Growing Concern
In a concerning trend, cybersecurity experts have identified that malicious actors are exploiting Microsoft 365 mailbox rules as a means to conduct data exfiltration and maintain persistence within compromised environments. This development...