Attackers Hijack Facebook Pages, Promote Malicious AI Photo Editor – Dark Reading
A malvertising campaign uses phishing to steal legitimate account pages, with the endgame of delivering the Lumma stealer. – Read More
A malvertising campaign uses phishing to steal legitimate account pages, with the endgame of delivering the Lumma stealer. – Read More
Significant upcoming legislation promises to tighten the screws on cyber incident response in Australia, mirroring CIRCIA in the US. – Read More
DEV#POPPER is back, looking to deliver a comprehensive, updated infostealer to coding job seekers by way of a savvy social engineering gambit. – Read More
Post Content – Read More
Post Content – Read More
Post Content – Read More
The process took two years, but this is the first successful settlement obtained under Texas’ Capture or Use of Biometric Identifier Act, which forbids the capture of biometric data without…
Malicious actors could potentially exploit this vulnerability if they gain physical access to a user’s device. – Read More
The sustained cyberattack, likely made worse by a mitigation snafu, disrupted several Azure cloud services for nearly eight hours on July 30. – Read More
Two US senators accuse carmakers of deceptive language and shifty practices in sharing and resale of driver data. – Read More
The security vulnerabilities, CVE-2024-37394, CVE-2024-37395, and CVE-2024-37396, could lay open proprietary and sensitive research to data thieves. – Read More
If paying a ransom is prohibited, organizations won’t do it — eliminating the incentive for cybercriminals. Problem solved, it seems. Or is it? – Read More
A network of more than 2,600 Telegram bots has helped exfiltrate one-time passwords and data from devices for more than two years. – Read More
The nation-state espionage group known for attacking Pakistan has expanded its reach to targets in Egypt and Sri Lanka. – Read More
Clutch Security is the latest cybersecurity startup looking to secure and manage non-human identity. – Read More