Following a Series of Government Hacks, Biden Closes Out His Administration With New Cybersecurity Order
Following a Series of Government Hacks, Biden Closes Out His Administration With New Cybersecurity Order In his final week in office, President Joe Biden issued an executive order aimed at improving the nation’s cybersecurity. This order requires software providers, like Microsoft, to prove they meet certain security standards before selling their products to the federal […]
New Gmail Cyber Attack Warning As Private Key Hackers Strike
New Gmail Cyber Attack Warning As Private Key Hackers Strike Researchers have identified a new threat campaign targeting Solana crypto wallet holders by exploiting Gmail’s trusted status. Hackers are using malicious NPM packages to steal private keys via Gmail’s SMTP servers. These packages, disguised as legitimate tools, intercept private keys during wallet interactions. The attack […]
Mirai Botnet Variant Exploits Four-Faith Router Vulnerability for DDoS Attacks
Mirai Botnet Variant Exploits Four-Faith Router Vulnerability for DDoS Attacks A Mirai botnet variant has been found exploiting a newly disclosed security flaw impacting Four-Faith industrial routers since early November 2024 with the goal of conducting distributed denial-of-service (DDoS) attacks. The botnet maintains approximately 15,000 daily active IP addresses, with the infections primarily scattered across […]
Critical Google Chrome Warning For 2.6 Million as 2FA Hackers Attack
Critical Google Chrome Warning For 2.6 Million as 2FA Hackers Attack An ongoing attack aimed at bypassing two-factor authentication protections and targeting Google Chrome users was confirmed when a cybersecurity company confirmed that its browser extension had been injected with malicious code. It now appears that at least 35 companies had their Chrome extensions replaced […]
Your Windows 11 PC is Acting Up? Here are 4 Essential Settings to Always Check First
Your Windows 11 PC is Acting Up? Here are 4 Essential Settings to Always Check First If your device’s performance is worsening, there could be several issues like too many apps taking up resources, unoptimized settings, or a virus infecting the hardware. Luckily, there are 4 easy steps you can take to combat these problems […]
Trend Micro, a cybersecurity vendor, has rolled out a new “AI brain”
Trend Micro, a cybersecurity firm, has developed an AI-powered “brain” designed to anticipate and defend against cyber threats. This innovative technology, trained on a massive dataset of threat intelligence, enables Trend Micro’s systems to learn from experience, adapt to new threats, and make predictions about potential attacks. Read More on AP News
Microsoft December 2024 Patch Tuesday fixes 1 exploited zero-day, 71 flaws
Microsoft December 2024 Patch Tuesday fixes 1 exploited zero-day, 71 flaws Today is Microsoft’s December 2024 Patch Tuesday, which includes security updates for 71 flaws, including one actively exploited zero-day vulnerability. This Patch Tuesday fixed sixteen critical vulnerabilities, all of which are remote code execution flaws. This month’s Patch Tuesday fixes one actively exploited, publicly […]
Major Telecom Hack
A telecom hack by Chinese-backed actors, Salt Typhoon, has recently been announced targeting U.S. senior government officials. The scope of the attack is still unknown and it’s likely that the actors still have a foothold. Read More on PBS News
Microsoft Hacking Warning Among 450 Million Windows Users
Microsoft Hacking Warning Among 450 Million Windows Users On Tuesday, ESET published a report into a previously unknown Windows vulnerability that was chained with a similarly unknown browser vulnerability to successfully attack PCs. Both threats have now been patched, and Windows users need to ensure their PCs are now updated.There are still 850 million Windows […]
Blue Yonder hit by ransomware attack affecting services to US and UK grocery stores
Blue Yonder is a major software supply-chain company that provides software to US and UK grocery stores and Fortune 500 firms. A attacker hit the Arizona-based software firm affecting a private cloud computing service the company provides some customers, but not the company�s public cloud environment. Read more on CNN