cyber security
Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection
Cybersecurity researchers at Cofense Intelligence have identified a sophisticated phishing tactic leveraging Blob URIs (Uniform Resource Identifiers) to deliver credential phishing pages directly to users’ inboxes while evading traditional...
cyber security
UK Government to Shift Away from Passwords in New Security Move
UK government has unveiled plans to implement passkey technology across its digital services later this year, marking a significant shift away from traditional password...
Cyber Attack
New Spam Campaign Leverages Remote Monitoring Tools to Exploit Organizations
A sophisticated spam campaign targeting Portuguese-speaking users in Brazil has been uncovered by Cisco Talos, active since at least January 2025.
This campaign exploits...
Cyber Crime
FBI Alerts Public to Scammers Posing as IC3 Officials in Fraud Scheme
The Federal Bureau of Investigation (FBI) has issued a warning regarding an emerging scam where criminals impersonate officials from the Internet Crime Complaint Center...
cyber security
New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures
Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking" (WTH), designed to execute malicious code within legitimate processes while...
AI
EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data
As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR), enacted in 2018, remains a cornerstone of data privacy and...
AI
DoJ Launches Critical National Security Program to Protect Americans’ Sensitive Data
The U.S. Department of Justice has launched a landmark initiative to block foreign adversaries—including China, Russia, and Iran—from exploiting commercial channels to access sensitive...
cyber security
Advanced CoffeeLoader Malware Evades Security to Deliver Rhadamanthys Shellcode
Security researchers at Zscaler ThreatLabz have identified a new sophisticated malware family called CoffeeLoader, which emerged around September 2024.
This advanced loader employs numerous...
cyber security
Clio: Real-Time Logging Tool with Locking, User Authentication, and Audit Trails
Clio is a cutting-edge, secure logging platform designed specifically for red team operations and security assessments.
This collaborative tool offers real-time logging capabilities, allowing...
cyber security
Enhancing Satellite Security by Encrypting Video Data Directly on Payloads
The rapid expansion of low-Earth orbit (LEO) satellite constellations has underscored the need for secure video transmission in satellite communication systems.
Applications such as...
cyber security
49,000+ Access Management Systems Worldwide Exposed to Major Security Gaps
A recent study conducted by Dutch IT security consultancy Modat has revealed alarming vulnerabilities in over 49,000 access management systems (AMS) worldwide.
These systems,...