Critical Vulnerability in DELMIA Apriso Factory Software Exploited in Attacks
Cybersecurity authorities have raised alarms over a critical vulnerability affecting DELMIA Apriso, a widely used [...]
Sep
France Reports Apple Warned Users About New Spyware Attacks
According to the French government, Apple has alerted several individuals that their devices may have [...]
Sep
Attackers Adopt Novel LOTL Techniques to Evade Detection
Threat actors are increasingly chaining living-off-the-land (LOTL) techniques and abusing less obvious file types to [...]
Sep
New HybridPetya Ransomware Bypasses UEFI Secure Boot via CVE-2024-7344
Cybersecurity researchers have uncovered a new ransomware strain called HybridPetya, which resembles the infamous Petya/NotPetya [...]
Sep
From a Simple “Like” to Financial Ruin: A Real-Life Scam Story
We often hear about people falling victim to scams, losing money, and facing devastating consequences. [...]
Sep
Akira Ransomware Exploits Year-Old SonicWall Vulnerability
Cybersecurity researchers have reported that the Akira ransomware group is actively exploiting a year-old vulnerability [...]
Sep
Fileless Malware Uses Legitimate Tools to Deploy Advanced RAT
Cybersecurity researchers have uncovered a sophisticated fileless malware campaign that leverages legitimate system tools to [...]
Sep
UK Students Drive Majority of School Cybersecurity Breaches, ICO Warns
The UK’s Information Commissioner’s Office (ICO) has revealed a concerning trend: students are responsible for [...]
Sep
Google Pixel 10 Introduces C2PA Support for Verifying AI-Generated Media
Google has announced that its new Pixel 10 smartphones will natively support the Coalition for [...]
Sep
Fake BMV Texts Target Victims With Phishing and Identity Theft
Cybercriminals are currently running a phishing campaign disguised as messages from the Bureau of Motor [...]
Sep