cyber security

Researchers Remotely Hack Commercial Trucks & Buses to Unlock ThemResearchers Remotely Hack Commercial Trucks & Buses to Unlock Them

Researchers Remotely Hack Commercial Trucks & Buses to Unlock Them

Security researchers have issued an urgent warning that commercial trucks and buses are significantly more vulnerable to cybersecurity attacks than…

3 weeks ago
Hackers Exploiting Exposed Jupyter Notebooks to Deploy CryptominersHackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting both Windows and Linux systems. The…

3 weeks ago
AWS SNS Exploited for Data Exfiltration and Phishing AttacksAWS SNS Exploited for Data Exfiltration and Phishing Attacks

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service that facilitates communication between applications and…

3 weeks ago
The Evolution Of Cloud Data Security: Why Traditional Tools Are No Longer EnoughThe Evolution Of Cloud Data Security: Why Traditional Tools Are No Longer Enough

The Evolution Of Cloud Data Security: Why Traditional Tools Are No Longer Enough

Cloud technology has revolutionised how businesses function, with unprecedented scalability and flexibility. However, this transformation has also brought about an…

3 weeks ago
DeepSeek R1 Jailbreaked to Create Malware, Including Keyloggers and RansomwareDeepSeek R1 Jailbreaked to Create Malware, Including Keyloggers and Ransomware

DeepSeek R1 Jailbreaked to Create Malware, Including Keyloggers and Ransomware

The increasing popularity of generative artificial intelligence (GenAI) tools, such as OpenAI’s ChatGPT and Google’s Gemini, has attracted cybercriminals seeking…

3 weeks ago
New Context Compliance Exploit Jailbreaks Major AI ModelsNew Context Compliance Exploit Jailbreaks Major AI Models

New Context Compliance Exploit Jailbreaks Major AI Models

Microsoft researchers have uncovered a surprisingly straightforward method that can bypass safety guardrails in most leading AI systems. In a…

3 weeks ago
Ongoing Cyber Attack Mimic Booking.com to Spread Password-Stealing MalwareOngoing Cyber Attack Mimic Booking.com to Spread Password-Stealing Malware

Ongoing Cyber Attack Mimic Booking.com to Spread Password-Stealing Malware

Microsoft Threat Intelligence has identified an ongoing phishing campaign that began in December 2024, targeting organizations in the hospitality industry…

3 weeks ago
Blind Eagle Targets Organizations with Weaponized .URL Files to Steal User HashesBlind Eagle Targets Organizations with Weaponized .URL Files to Steal User Hashes

Blind Eagle Targets Organizations with Weaponized .URL Files to Steal User Hashes

APT-C-36, more commonly known as Blind Eagle, has intensified its operations targeting Colombian governmental, financial, and critical infrastructure organizations. Active…

3 weeks ago
Hackers Exploiting JSPSpy To Manage Malicious Webshell NetworksHackers Exploiting JSPSpy To Manage Malicious Webshell Networks

Hackers Exploiting JSPSpy To Manage Malicious Webshell Networks

Cybersecurity researchers have recently identified a cluster of JSPSpy web shell servers featuring an unexpected addition, Filebroser, a rebranded version…

3 weeks ago
North Korean Hackers Use Google Play Malware to Steal SMS, Calls & ScreenshotsNorth Korean Hackers Use Google Play Malware to Steal SMS, Calls & Screenshots

North Korean Hackers Use Google Play Malware to Steal SMS, Calls & Screenshots

Cybersecurity researchers at Lookout Threat Lab have uncovered a sophisticated Android surveillance tool dubbed "KoSpy," which appears to be the…

3 weeks ago