BLUFFS: Six New Attacks that Break Secrecy of Bluetooth Sessions
Six novel Bluetooth attack methods have been discovered, which were named BLUFFS (Bluetooth Forward and Future Secrecy) attacks. These attacks could enable threat actors...
Google Workspace’s Design Flaw Allows Attacker Unauthorized Access
Recent years saw a surge in cloud tech adoption, highlighting the efficiency through tools like Google's Domain-Wide Delegation. It enables GCP (Google Cloud Platform) identities...
Serial ‘SIM Swapper’ Sentenced to Eight Years in Prison
In a digital age marred by deceit, 25-year-old Amir Hossein Golshan stands as a testament to the dark underbelly of cyberspace. Hailing from downtown Los...
Hackers Behind High-Profile Ransomware Attacks on 71 Countries Arrested
Hackers launched ransomware attacks to extort money from the following two entities by encrypting their data and demanding a ransom payment for its release:-IndividualsOrganizations Here,...
Chinese Hackers Spent 2+Years Looting Secrets in Dutch Semiconductor Company
For over two years, a hacker group linked to China had uninterrupted access to NXP, the Dutch chip manufacturer's computer network.They target chips to...
Broadcom Completes the $61 Billion Acquisition of VMware
Broadcom Inc., a multinational semiconductor manufacturing company headquartered in San Jose, CA, has announced the successful acquisition of VMware in a $61 billion deal.VMware...
Google Drive Users Files Suddenly Disappeared, Tech Gaint Investigating
In a perplexing turn of events, a notable cohort of Google Drive users is grappling with the disappearance of files from their accounts. Reports indicate...
Cybersecurity tool investments are rising in Asia-Pacific as Cyberattacks grow
Investments in cybersecurity tools have been on the rise in the Asia-Pacific region, owing to the increased prevalence of cyberattacks. It is projected that...
A New Telekopye Bots That Tricks Users to Steal Payment Details
Phishing bots are a tool used by hackers to fool people into disclosing private information such as-Login credentialsFinancial detailsWith the help of these automated...
NukeSped Malware Exploiting Apache ActiveMQ Vulnerability
The Andariel threat group has been discovered installing malware via the exploitation of the Apache ActiveMQ remote code execution vulnerability classified as CVE-2023-46604.The group is known...