EU citizens’ rights are under threat from anti-encryption proposals

[web_stories title=”true” excerpt=”false” author=”false” date=”false” archive_link=”true” archive_link_label=”” circle_size=”150″ sharp_corners=”false” image_alignment=”left” number_of_columns=”1″ number_of_stories=”5″ order=”DESC” orderby=”post_title” view=”circles” /]An EU Commission proposal to address child sexual abuse material online would make everyone less safe, including children, writes Callum Vogue. Callum Vogue is a Senior Government Affairs and Advocacy Advisor at the Internet Society. Governments across Europe are seeking…

Read More
Cisco Patched Multiple Security Vulnerabilities

Cisco Patched Multiple Security Vulnerabilities In Nexus Dashboard

Cisco has addressed several vulnerabilities in its Nexus Dashboard. Taking advantage of these vulnerabilities can allow attackers to perform CSRF attacks or execute arbitrary code. | Cisco Patched Multiple Security Vulnerabilities In Nexus Dashboard Ethical Hacking Complete Tutorial Step By Step Guide Part-1 Ethical Hacking Complete Tutorial Step By Step Guide Part-2 Cisco Nexus Dashboard…

Read More
india-powergrid-cyberattack

Chinese Hacker Groups Continue to Target Indian Power Grid Assets

China-linked adversaries have been attributed to an ongoing onslaught against Indian power grid organizations, one year after a concerted campaign targeting critical infrastructure in the country came to light. Most of the intrusions involved a modular backdoor named ShadowPad, according to Recorded Future’s Insikt Group, a sophisticated remote access trojan which has been dubbed a “masterpiece of privately sold malware…

Read More
hacking

Hamas-linked Hackers Targeting High-Ranking Israelis Using ‘Catfish’ Lures

Hamas-linked Hackers Targeting High-Ranking Israelis Using ‘Catfish’ Lures || A threat actor with affiliations to the cyber warfare division of Hamas has been linked to an “elaborate campaign” targeting high-profile Israeli individuals employed in sensitive defense, law enforcement, and emergency services organizations. “The campaign operators use sophisticated social engineering techniques, ultimately aimed to deliver previously…

Read More
North Korean Hackers

North Korean Hackers Distributing Trojanized DeFi Wallet Apps to Steal Victims’ Crypto

A state-backed North Korean hacking team, also known as the Lazarus Group, has been linked to another financially motivated campaign that uses a decentralized finance (DeFi) wallet Trojan application to spread a fully functional backdoor to compromised Windows systems. The app, equipped with features for saving and managing a cryptocurrency wallet, is also designed to…

Read More
Magniber ransomware

Magniber ransomware being spread in the guise of a legit Microsoft Edge and Google Chrome update

Analysts have now discovered that attackers behind the Magniber ransomware, who have been exploiting IE-based vulnerabilities so far, are now targeting PCs via modern browsers such as Edge and Chrome. The Magniber ransomware is disguised as a legit update package for Edge or Chrome and comes as a signed .appx file. Installing this “update” will…

Read More
Consular-Department-of-the-Embassy-of-the-Russian-Federation

Nobelium continues to target organizations worldwide with custom malware

Russia-linked Nobelium APT group is using a new custom malware dubbed Ceeloader in attacks against organizations worldwide. Mandal researchers have identified two different groups of activity, which tracked the UNC3004 and unc2652, which were connected to the Nobelium APT Group (aka UNC2452) connected to Russia. | custom malware Nobelium APT (APT 29, Koji Bear, and…

Read More
hacking news

Apple drops controversial lawsuit against Corellium

Apple has dropped a controversial intellectual property lawsuit against virtualization software maker Corelium, days before the case was set to go to trial. Corelium’s software technology enables users to create virtual iOS devices within a browser, allowing security researchers to more easily test for bugs and exploits. The same virtualization technology allows tech journalists to…

Read More