Computer Security
Subaru Starlink Vulnerability Exposed Cars to Remote Hacking
A major vulnerability in Subaru’s Starlink connected vehicle service exposed vehicles and customer accounts in the US, Canada, and Japan to potential cyberattacks. Security researcher Sam Curry, along with fellow... Read more
PlushDaemon APT Group: A Dive into a Covert Cyber Operation
Unveiling a Sophisticated Cyber Threat PlushDaemon, an advanced persistent threat (APT) group with links to China, represents a sophisticated player in cyber espionage. This group has drawn attention for its targeted... Read more
Fortinet Warns of Zero-Day Exploit Targeting Firewalls with Exposed Interfaces
Cybersecurity firm Fortinet has sounded the alarm on an active zero-day vulnerability campaign targeting FortiGate firewall devices with exposed management interfaces. These attacks, attributed to unknown threat... Read more
Uncovering The CVE-2024-44243 macOS Vulnerability
A Closer Look at CVE-2024-44243 Apple’s macOS has long been regarded for its strong security mechanisms, but vulnerabilities occasionally surface, requiring swift intervention. One such issue, CVE-2024-44243, was... Read more
Mirai Botnet Variant Exploits Four-Faith Router Flaw to Unleash DDoS Attacks
In a stark reminder of the growing dangers posed by botnets, a new Mirai variant has been exploiting vulnerabilities in Four-Faith industrial routers since early November 2024. This latest botnet, dubbed “gayfemboy”... Read more
Dozens of Chrome Extensions Hacked, Over 2.6 Million Users Exposed to Data Theft
In a major cybersecurity breach, at least 35 popular Chrome browser extensions were compromised, exposing over 2.6 million users to potential data theft and credential harvesting. The attack targeted extension... Read more
AIRASHI Botnet: A Complex Cyber Threat Targeting IoT Devices
The AIRASHI botnet stands out as a sophisticated example of how threat actors are leveraging vulnerabilities in Internet of Things (IoT) devices to orchestrate large-scale attacks. This botnet, a derivative of the... Read more
HPE Investigates Potential Data Breach After Hacker Offers Stolen Data for Sale
Tech giant Hewlett Packard Enterprise (HPE) has launched an investigation into claims by the notorious hacker "IntelBroker," who alleges possession of sensitive company data, including source code and private... Read more
Google Ads Malvertising Scam Is Out There to Get Online Advertisers
A Sophisticated Deception Targeting Advertisers Cybersecurity analysts have uncovered a deceptive scheme targeting businesses and individuals using Google Ads. This fraudulent campaign exploits Google’s advertising... Read more
Abandoned Domains Reclaimed to Expose 4,000 Hidden Backdoors on Compromised Systems
Cybercriminals often leverage backdoors—hidden gateways designed to bypass traditional security measures—to maintain access to compromised systems. In a surprising twist, cybersecurity researchers have demonstrated... Read more
Ransomware Attack at New York Hospital Exposes Data of Over 670,000 People
Richmond University Medical Center (RUMC), a prominent healthcare facility in Staten Island, New York, recently disclosed the devastating impact of a ransomware attack that began in May 2023. After months of... Read more
Apple to Pay Siri Users $20 Per Device in Settlement Over Accidental Privacy Violations
Apple has agreed to pay a $95 million settlement to resolve a class-action lawsuit that accused the tech giant of privacy violations related to its Siri voice assistant. The case centers on allegations that Siri... Read more
Record-Breaking DDoS Attack Peaks at 5.6 Tbps and Signals Growing Cyber Threats
Distributed denial-of-service (DDoS) attacks have hit unprecedented levels, with a record-breaking 5.6 Tbps assault blocked by Cloudflare in late 2024. This staggering attack highlights the growing scale and... Read more
U.S. Sanctions North Korean IT Worker Network Supporting Weapons of Mass Destruction Programs
The U.S. Treasury Department has taken decisive action against a shadowy network of North Korean IT workers accused of funneling illicit revenue to fund the country’s weapons of mass destruction (WMD) and ballistic... Read more
U.S. Tightens AI Chip Exports, Aiming to Maintain Global Leadership
The United States has introduced sweeping new restrictions on the export of artificial intelligence (AI) chips, significantly expanding its global controls on advanced technology. These measures, designed to secure... Read more
PayPal Phishing Campaign Uses Genuine Links to Hijack Accounts
A sophisticated phishing campaign is targeting PayPal users, exploiting legitimate links and email addresses to deceive victims and take over their accounts. This alarming attack, highlighted by cybersecurity firm... Read more
Is Your Car Spying on You - Tesla Cybertruck Explosion Raises Alarming Privacy Questions
The car of the future is here—but it might be spying on you. Recent revelations about Tesla's role in assisting law enforcement after a Cybertruck explosion in Las Vegas have reignited debates about privacy in modern... Read more
What Is DragonDrop And What Does It Want?
Introduction to DragonDrop DragonDrop is a term associated with both legitimate software and potential cybersecurity threats. Originally, DragonDrop referred to a macOS utility designed to enhance drag-and-drop... Read more