Category cyber-attacks

Microsoft Teams Vishing Attack Leverages TeamViewer to Distribute Malware

Vishing Attack Leads to Environment Compromise at Ontinue’s Cyber Defense Centre The Cyber Defense Centre (CDC) at Ontinue has recently examined an alarming security breach that underscores the potential dangers of vishing calls. This incident illustrates how a seemingly innocuous voice phishing attack can escalate into a comprehensive compromise of…

Read MoreMicrosoft Teams Vishing Attack Leverages TeamViewer to Distribute Malware

Cybersecurity Professor Mysteriously Vanishes Amid FBI Raids on His Properties

In a perplexing development that has raised eyebrows in the academic and cybersecurity communities, Xiaofeng Wang, a distinguished computer scientist at Indiana University, has seemingly vanished from public view. Wang, who has dedicated the past two decades to advancing knowledge in cryptography, privacy, and cybersecurity, has had his university profile,…

Read MoreCybersecurity Professor Mysteriously Vanishes Amid FBI Raids on His Properties

Hacker Alleges Breach of Check Point Cybersecurity Firm and Offers Access for Sale

A hacker known as “CoreInjection” has claimed responsibility for breaching the systems of Check Point, an Israeli cybersecurity firm, asserting that they have gained access to sensitive internal information and network infrastructure. This announcement was made on Breach Forums on March 30, 2025, where CoreInjection offered to sell the stolen…

Read MoreHacker Alleges Breach of Check Point Cybersecurity Firm and Offers Access for Sale

Revealing Insights: What Users Really Created with an Exposed AI Image Generator Database

Recent findings by cybersecurity researcher Fowler reveal alarming content associated with the GenNomis website, which had previously hosted a database containing disturbing AI-generated imagery. Among the material identified were not only questionable adult images but also potential child sexual abuse material (CSAM) linked to face-swapping technologies. Fowler indicated that several…

Read MoreRevealing Insights: What Users Really Created with an Exposed AI Image Generator Database

FBI Conducts Raid on Home of Notable Computer Scientist Who Is Now Out of Touch

A distinguished computer scientist with two decades of expertise in cryptography, privacy, and cybersecurity has mysteriously gone silent. Xiaofeng Wang, a tenured professor at Indiana University and former associate dean for research at the Luddy School of Informatics, Computing, and Engineering, has had his professional profiling and communication channels abruptly…

Read MoreFBI Conducts Raid on Home of Notable Computer Scientist Who Is Now Out of Touch

Sensitive Passwords and Personal Phone Numbers of Top Trump Officials Exposed Online

In a landscape increasingly marked by digital vulnerabilities, high-ranking government officials are facing unprecedented threats from sophisticated online adversaries, particularly nation-state hackers. Recent revelations indicate that while millions of everyday users are often caught in data breaches and maintain poor privacy settings, officials are subject to a broader array of…

Read MoreSensitive Passwords and Personal Phone Numbers of Top Trump Officials Exposed Online

Oracle Reportedly Faces Two Separate Breaches Compromising Thousands of Customers’ Personal Information

Trustwave’s Spider Labs has recently disclosed a significant security concern involving alleged compromised Lightweight Directory Access Protocol (LDAP) credentials associated with Oracle Cloud. According to Spider Labs, the credentials provided by an entity identified as rose87168 expose a considerable volume of sensitive identity and access management data linked to a…

Read MoreOracle Reportedly Faces Two Separate Breaches Compromising Thousands of Customers’ Personal Information

Gemini Hackers Enhance Attack Potency with Assistance from… Gemini

Recent research has unveiled the effectiveness of various attack methods against Google’s Gemini models, revealing significant vulnerabilities that pose risks to cybersecurity. The findings indicate an attack success rate of 65% against the Gemini 1.5 Flash model and 82% against the Gemini 1.0 Pro, in stark contrast to baseline success…

Read MoreGemini Hackers Enhance Attack Potency with Assistance from… Gemini