Category cyber-attacks

Dell Unveils New Cybersecurity Tool for Detecting BIOS Attacks

Dell Unveils New Security Tool to Combat BIOS Vulnerabilities In a notable development within the cybersecurity landscape, Dell Technologies has introduced an innovative security solution tailored for its commercial clientele, aiming to defend against sophisticated cyberattacks that target the BIOS (Basic Input Output System). This new tool, named “SafeBIOS Events…

Read MoreDell Unveils New Cybersecurity Tool for Detecting BIOS Attacks

U.S. Promises Rewards of Up to $5 Million for Information on North Korean Cybercriminals

Recent advisories from U.S. government agencies highlight an ongoing and substantial cyber threat from North Korean state-sponsored hacking groups, particularly targeting global banking and financial institutions. This joint advisory, released by the Departments of State, Treasury, Homeland Security, and the FBI, summarizes a series of cyberattacks attributed to North Korean…

Read MoreU.S. Promises Rewards of Up to $5 Million for Information on North Korean Cybercriminals

Targeted Phishing Attacks Compromise Over 150 Top Executives Across Companies

Recent reports indicate that multiple attack groups have successfully breached corporate email accounts belonging to at least 156 high-ranking executives across various firms located in Germany, the UK, Netherlands, Hong Kong, and Singapore. This campaign has been identified as **PerSwaysion**, which has utilized Microsoft’s file-sharing services—specifically Sway, SharePoint, and OneNote—to…

Read MoreTargeted Phishing Attacks Compromise Over 150 Top Executives Across Companies

Hackers Compromise LineageOS, Ghost, and DigiCert Servers Exploiting SaltStack Vulnerability

Shortly after cybersecurity researchers raised warnings about two significant vulnerabilities in the SaltStack configuration framework, an ongoing campaign has already begun exploiting these flaws, targeting organizations such as LineageOS, Ghost, and DigiCert. The vulnerabilities, identified as CVE-2020-11651 and CVE-2020-11652, permit attackers to execute arbitrary code on remote servers operating within…

Read MoreHackers Compromise LineageOS, Ghost, and DigiCert Servers Exploiting SaltStack Vulnerability

Chinese Crypto Scammers on Telegram Are Driving the Growth of the Largest Darknet Markets Yet

The emergence of black markets for illegal goods, including drugs and weapons, began on the dark web over a decade ago, leveraging cryptocurrencies and anonymity tools like Tor. At that time, these innovations facilitated the execution of vast, untraceable online transactions valued in the billions. Fast forward to 2025, and…

Read MoreChinese Crypto Scammers on Telegram Are Driving the Growth of the Largest Darknet Markets Yet

Undetected for Five Years: The Asia-Pacific Cyber Espionage Campaign

Recent investigations have revealed that a sophisticated group of Chinese hackers, known as ‘Naikon APT,’ has been executing a prolonged cyber espionage campaign targeting various governmental entities across Australia, Indonesia, the Philippines, Vietnam, Thailand, Myanmar, and Brunei. This campaign, which has remained undetected for a minimum of five years, continues…

Read MoreUndetected for Five Years: The Asia-Pacific Cyber Espionage Campaign

NYPD Faces Lawsuit Over Alleged Records Gathered from Muslim Surveillance Program

A New Jersey resident has initiated a new open-records lawsuit against the City of New York, building on previous attempts to uncover potential surveillance conducted by the New York City Police Department (NYPD). This comes amid ongoing concerns regarding the NYPD’s Intelligence Division and its past involvement in monitoring Muslim…

Read MoreNYPD Faces Lawsuit Over Alleged Records Gathered from Muslim Surveillance Program

U.S. Defense Issues Alert on Three New Malware Strains Deployed by North Korean Hackers

On the third anniversary of the global WannaCry ransomware outbreak, attributed to North Korea, the U.S. government has disclosed details about three new malware variants utilized by state-sponsored North Korean hackers. These variants, named COPPERHEDGE, TAINTEDSCRIBE, and PEBBLEDASH, are designed for remote reconnaissance and the extraction of sensitive information from…

Read MoreU.S. Defense Issues Alert on Three New Malware Strains Deployed by North Korean Hackers