What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Blog.webp 2024-12-25 12:43:55 The Fintech Wild West: Why Preventive Cybersecurity Is Essential for Survival (lien direct) Fintech thrives on innovation, but cybersecurity requires a proactive approach. AI, predictive intelligence, and tailored strategies safeguard against…
Fintech thrives on innovation, but cybersecurity requires a proactive approach. AI, predictive intelligence, and tailored strategies safeguard against…
★★
Blog.webp 2024-12-24 18:51:13 Postman Workspaces Leak 30000 API Keys and Sensitive Tokens (lien direct) Thousands of Postman workspaces leaked sensitive data like API keys and tokens. Learn best practices to secure your API development environment and protect your organization
Thousands of Postman workspaces leaked sensitive data like API keys and tokens. Learn best practices to secure your API development environment and protect your organization
★★★
Blog.webp 2024-12-24 16:11:46 Python Malware in Zebo-0.1.0 and Cometlogger-0.1 Found Stealing User Data (lien direct) Fortinet discovers two malicious Python packages, Zebo-0.1.0 and Cometlogger-0.1, designed to steal data, capture keystrokes, and gain system control. Learn about their malicious behavior and how to protect yourself
Fortinet discovers two malicious Python packages, Zebo-0.1.0 and Cometlogger-0.1, designed to steal data, capture keystrokes, and gain system control. Learn about their malicious behavior and how to protect yourself
Malware ★★
Blog.webp 2024-12-24 00:58:19 Neuro Nostalgia Hackathon 2024: A Retro Journey with Modern Twists (lien direct) Relive the 90s web era! The Neuro Nostalgia Hackathon challenged teams to transform modern sites into retro masterpieces…
Relive the 90s web era! The Neuro Nostalgia Hackathon challenged teams to transform modern sites into retro masterpieces…
★★★
Blog.webp 2024-12-23 20:06:03 Lazarus Group Targets Nuclear Industry with CookiePlus Malware (lien direct) KEY SUMMARY POINTS Securelist by Kaspersky has published its latest threat intelligence report focused on the activities of…
KEY SUMMARY POINTS Securelist by Kaspersky has published its latest threat intelligence report focused on the activities of…
Malware Threat APT 38 ★★★★
Blog.webp 2024-12-23 12:54:57 Why Ethereum Will Be a Key Platform for Businesses in the Future (lien direct) Explore how Ethereum revolutionizes industries with smart contracts, DeFi, NFTs, gaming, DAOs, and sustainability, shaping the future of…
Explore how Ethereum revolutionizes industries with smart contracts, DeFi, NFTs, gaming, DAOs, and sustainability, shaping the future of…
★★
Blog.webp 2024-12-23 11:43:45 Supply Chain Attack Hits Rspack, Vant npm Packages with Monero Miner (lien direct) Popular npm packages, Rspack and Vant, were recently compromised with malicious code. Learn about the attack, the impact, and how to protect your projects from similar threats.
Popular npm packages, Rspack and Vant, were recently compromised with malicious code. Learn about the attack, the impact, and how to protect your projects from similar threats.
★★★
Blog.webp 2024-12-20 18:28:45 LockBit Developer Rostislav Panev, a Dual Russian-Israeli Citizen, Arrested (lien direct) LockBit ransomware gang\'s takedown is in progress!
LockBit ransomware gang\'s takedown is in progress!
Ransomware ★★★
Blog.webp 2024-12-20 15:11:48 Builder.ai Database Misconfiguration Exposes 1.29 TB of Unsecured Records (lien direct) Cybersecurity researcher Jeremiah Fowler discovered a 1.2TB database containing over 3 million records of Builder.ai, a London-based AI software and app development company. Discover the risks, lessons learned, and best practices for data security.
Cybersecurity researcher Jeremiah Fowler discovered a 1.2TB database containing over 3 million records of Builder.ai, a London-based AI software and app development company. Discover the risks, lessons learned, and best practices for data security.
★★★
Blog.webp 2024-12-20 14:02:15 Top AI Trends Every Software Development Company to Follow in 2025 (lien direct) The software development industry is expanding tremendously. It drives up the need for technical people and new solutions.…
The software development industry is expanding tremendously. It drives up the need for technical people and new solutions.…
Technical ★★
Blog.webp 2024-12-19 23:54:20 Play Ransomware Claims Krispy Kreme Breach, Threatens Data Leak (lien direct) KEY SUMMARY POINTS Krispy Kreme, the beloved doughnut chain, disclosed a data breach on December 11, 2024, in…
KEY SUMMARY POINTS Krispy Kreme, the beloved doughnut chain, disclosed a data breach on December 11, 2024, in…
Ransomware Data Breach ★★
Blog.webp 2024-12-19 15:00:08 Sonic and Injective Team Up to Build Industry\\'s First Cross-Chain Smart Agent Hub with Solana (lien direct) Sonic, the leading gaming SVM on Solana, and Injective, a WASM-based L1 network, today announced that they will…
Sonic, the leading gaming SVM on Solana, and Injective, a WASM-based L1 network, today announced that they will…
★★★
Blog.webp 2024-12-19 13:40:54 Google Calendar Phishing Scam Targets Users with Malicious Invites (lien direct) Protect yourself from sophisticated phishing attacks that leverage Google Calendar to steal your personal information.
Protect yourself from sophisticated phishing attacks that leverage Google Calendar to steal your personal information.
★★
Blog.webp 2024-12-19 12:48:17 New Mobile Phishing Targets Executives with Fake DocuSign Links (lien direct) Cybercriminals are using advanced techniques to target executives with mobile-specific phishing attacks.
Cybercriminals are using advanced techniques to target executives with mobile-specific phishing attacks.
Mobile ★★
Blog.webp 2024-12-18 22:49:08 Biggest Crypto Scam Tactics in 2024 and How to Avoid Them (lien direct) Stay alert to crypto scams with our guide to 2024’s top threats, including phishing, malware, Ponzi schemes, and…
Stay alert to crypto scams with our guide to 2024’s top threats, including phishing, malware, Ponzi schemes, and…
Malware ★★
Blog.webp 2024-12-18 20:00:03 FBI Warns of HiatusRAT Malware Targeting Webcams and DVRs (lien direct) KEY SUMMARY POINTS The FBI has issued a Private Industry Notification (PIN) to highlight new malware campaigns targeting…
KEY SUMMARY POINTS The FBI has issued a Private Industry Notification (PIN) to highlight new malware campaigns targeting…
Malware ★★★
Blog.webp 2024-12-18 18:44:12 Maximizing Productivity with Online Document Solutions (lien direct) Many professionals juggle multiple document formats, leading to confusion and wasted time. Imagine a streamlined process that simplifies…
Many professionals juggle multiple document formats, leading to confusion and wasted time. Imagine a streamlined process that simplifies…
★★
Blog.webp 2024-12-18 15:21:51 Hackers Exploiting Linux eBPF to Spread Malware in Ongoing Campaign (lien direct) KEY SUMMARY POINTS Cybersecurity researchers Dr. Web have uncovered a new and active Linux malware campaign aimed at…
KEY SUMMARY POINTS Cybersecurity researchers Dr. Web have uncovered a new and active Linux malware campaign aimed at…
Malware ★★
Blog.webp 2024-12-18 13:17:11 The Need for Specialized AI Models in Today\\'s Transforming Industry Challenges (lien direct) Specialized AI models provide precise, domain-specific solutions for robotics, biotech, and materials science challenges.
Specialized AI models provide precise, domain-specific solutions for robotics, biotech, and materials science challenges.
★★
Blog.webp 2024-12-18 12:36:33 Androxgh0st Botnet Targets IoT Devices, Exploiting 27 Vulnerabilities (lien direct) Androxgh0st, a botnet targeting web servers since January 2024, is also deploying IoT-focused Mozi payloads, reveals CloudSEK\'s latest research.
Androxgh0st, a botnet targeting web servers since January 2024, is also deploying IoT-focused Mozi payloads, reveals CloudSEK\'s latest research.
Vulnerability ★★
Blog.webp 2024-12-17 19:07:01 Hackers Leak Partial Cisco Data from 4.5TB of Exposed Records (lien direct) Yet another day, yet another data leak tied to Cisco!
Yet another day, yet another data leak tied to Cisco!
★★
Blog.webp 2024-12-17 15:44:10 Hackers Demand Ransom in Rhode Island Health System Data Breach (lien direct) In a major cyberattack, the state of Rhode Island has fallen victim to a security breach potentially exposing the personal information of thousands of residents.
In a major cyberattack, the state of Rhode Island has fallen victim to a security breach potentially exposing the personal information of thousands of residents.
Data Breach ★★
Blog.webp 2024-12-17 14:54:05 RPC Management Has Come A Long Way In Two Short Years.  Here\\'s Why. (lien direct) Explore RPC Management: Learn how modern decentralized RPC providers solve scalability & connectivity issues in Web3, ensuring secure,…
Explore RPC Management: Learn how modern decentralized RPC providers solve scalability & connectivity issues in Web3, ensuring secure,…
★★
Blog.webp 2024-12-17 14:12:35 Hackers Use Fake PoCs on GitHub to Steal WordPress Credentials, AWS Keys (lien direct) SUMMARY Datadog Security Labs\' cybersecurity researchers have discovered a new, malicious year-long campaign from a threat actor identified…
SUMMARY Datadog Security Labs\' cybersecurity researchers have discovered a new, malicious year-long campaign from a threat actor identified…
Threat ★★
Blog.webp 2024-12-16 21:51:43 Cicada3301 Ransomware Claims Attack on French Peugeot Dealership (lien direct) SUMMARY Cicada3301, a ransomware group, has claimed responsibility for a data breach targeting Concession Peugeot (concessions.peugeot.fr), a prominent…
SUMMARY Cicada3301, a ransomware group, has claimed responsibility for a data breach targeting Concession Peugeot (concessions.peugeot.fr), a prominent…
Ransomware Data Breach ★★★
Blog.webp 2024-12-16 18:13:23 Cl0p Ransomware Exploits Cleo Vulnerability, Threatens Data Leaks (lien direct) SUMMARY The Cl0p ransomware group has recently claimed responsibility for exploiting a critical vulnerability in Cleo’s managed file…
SUMMARY The Cl0p ransomware group has recently claimed responsibility for exploiting a critical vulnerability in Cleo’s managed file…
Ransomware Vulnerability ★★
Blog.webp 2024-12-16 15:32:11 FBI Targets 764 Network: Man Faces 30 Years for Cyberstalking, CSAM (lien direct) A 20-year-old Tucson man was arrested for horrific CSAM and cyberstalking linked to the dangerous online extremist group 764.
A 20-year-old Tucson man was arrested for horrific CSAM and cyberstalking linked to the dangerous online extremist group 764.
★★
Blog.webp 2024-12-16 12:57:30 Firmware Security: Identifying Risks to Implement Best Cybersecurity Practices (lien direct) Find out the key security risks of firmware security: Identify threats, and learn best practices and protection methods…
Find out the key security risks of firmware security: Identify threats, and learn best practices and protection methods…
★★
Blog.webp 2024-12-16 12:09:58 Malware Hidden in Fake Business Proposals Hits YouTube Creators (lien direct) Cybercriminals are targeting YouTube creators with sophisticated phishing attacks disguised as brand collaborations. Learn how to identify these scams, protect your data, and safeguard your online presence
Cybercriminals are targeting YouTube creators with sophisticated phishing attacks disguised as brand collaborations. Learn how to identify these scams, protect your data, and safeguard your online presence
Malware ★★★
Blog.webp 2024-12-15 20:30:48 Resecurity introduces Government Security Operations Center (GSOC) at NATO Edge 2024 (lien direct) Resecurity unveils AI-powered GSOC at NATO Edge 2024, integrating VR for advanced cybersecurity. Tailored for MSSPs, it enhances…
Resecurity unveils AI-powered GSOC at NATO Edge 2024, integrating VR for advanced cybersecurity. Tailored for MSSPs, it enhances…
★★
Blog.webp 2024-12-13 21:44:39 Canadian Eyecare Firm Care1 Exposes 2.2TB of Patient Records (lien direct) Another day, another healthcare database misconfiguration exposing sensitive patient information.
Another day, another healthcare database misconfiguration exposing sensitive patient information.
Medical ★★
Blog.webp 2024-12-13 18:20:31 Serhiy Tokarev Explains Why Health Tech Startups Are Worth Investing In (lien direct) Health Tech is booming, projected to grow from $312.92B in 2024 to $981.23B by 2032. Serhiy Tokarev highlights…
Health Tech is booming, projected to grow from $312.92B in 2024 to $981.23B by 2032. Serhiy Tokarev highlights…
★★
Blog.webp 2024-12-13 16:18:07 The Role of Blockchain and Smart Contracts in Securing Digital Transactions (lien direct) Learn how blockchain and smart contracts improve cybersecurity factors in online transactions, remove the element of fraud, and…
Learn how blockchain and smart contracts improve cybersecurity factors in online transactions, remove the element of fraud, and…
★★
Blog.webp 2024-12-13 13:09:08 Bitcoin ATM Giant Byte Federal Hit by Hackers, 58,000 Users Impacted (lien direct) SUMMARY Byte Federal, the US\'s largest Bitcoin ATM operator offering around 1,200 Bitcoin ATMs across the country, recently…
SUMMARY Byte Federal, the US\'s largest Bitcoin ATM operator offering around 1,200 Bitcoin ATMs across the country, recently…
★★
Blog.webp 2024-12-12 23:07:53 Professions That Are the Most Exposed to Cybersecurity Threats (lien direct) Explore the professions most vulnerable to cybersecurity threats in 2025, from IT pros to crypto investors. Learn how…
Explore the professions most vulnerable to cybersecurity threats in 2025, from IT pros to crypto investors. Learn how…
★★★
Blog.webp 2024-12-12 22:09:04 The Growing Importance of Secure Crypto Payment Gateways (lien direct) Learn how cryptocurrency’s rapid growth brings risks like fake payment gateways and online scams. Discover tips to stay…
Learn how cryptocurrency’s rapid growth brings risks like fake payment gateways and online scams. Discover tips to stay…
★★
Blog.webp 2024-12-12 19:33:38 US Sanctions Chinese Cybersecurity Firm for Firewall Exploit, Ransomware Attacks (lien direct) SUMMARY The United States has taken strong action against a Chinese cybersecurity company, Sichuan Silence Information Technology, for…
SUMMARY The United States has taken strong action against a Chinese cybersecurity company, Sichuan Silence Information Technology, for…
Ransomware Threat ★★★
Blog.webp 2024-12-12 18:01:34 Authorities Shut Down 27 DDoS-for-Hire Platforms, Arrest 3 Admins (lien direct) Just in time for the holidays!
Just in time for the holidays!
★★★
Blog.webp 2024-12-12 13:10:09 Scammers Exploit Fake Domains in Dubai Police Phishing Scams (lien direct) BforeAI has discovered a surge in phishing attacks targeting the Dubai Police, a government-run entity. Learn how cybercriminals are exploiting the Dubai Police name to steal personal information and money.
BforeAI has discovered a surge in phishing attacks targeting the Dubai Police, a government-run entity. Learn how cybercriminals are exploiting the Dubai Police name to steal personal information and money.
Threat Legislation ★★★
Blog.webp 2024-12-12 00:51:35 Sora and ChatGPT Currently Down Worldwide: OpenAI Working on a Fix (lien direct) You are not alone, ChatGPT and Sora AI are down worldwide. OpenAI says it is aware of the…
You are not alone, ChatGPT and Sora AI are down worldwide. OpenAI says it is aware of the…
ChatGPT ★★★
Blog.webp 2024-12-12 00:20:10 Cyberbullying and the Law: When Does Online Harassment Become a Criminal Offense? (lien direct) The rise of social media and digital communication has transformed how we connect, but it has also opened…
The rise of social media and digital communication has transformed how we connect, but it has also opened…
★★★
Blog.webp 2024-12-11 20:07:04 Krispy Kreme Cyber Attack Disrupted Online Ordering in the US (lien direct) SUMMARY Popular doughnut chain Krispy Kreme has become the latest victim of a cyber attack. The incident, which…
SUMMARY Popular doughnut chain Krispy Kreme has become the latest victim of a cyber attack. The incident, which…
★★★
Blog.webp 2024-12-11 16:00:30 AuthQuake Flaw Allowed MFA Bypass Across Azure, Office 365 Accounts (lien direct) SUMMARY Cybersecurity researchers at Oasis Security have identified a vulnerability in Microsoft’s Multi-Factor Authentication (MFA), known as AuthQuake,…
SUMMARY Cybersecurity researchers at Oasis Security have identified a vulnerability in Microsoft’s Multi-Factor Authentication (MFA), known as AuthQuake,…
Vulnerability ★★★
Blog.webp 2024-12-11 13:00:24 Global Ongoing Phishing Campaign Targets Employees Across 12 Industries (lien direct) SUMMARY Cybersecurity researchers at Group-IB have exposed an ongoing phishing operation that has been targeting employees and associates from…
SUMMARY Cybersecurity researchers at Group-IB have exposed an ongoing phishing operation that has been targeting employees and associates from…
★★★
Blog.webp 2024-12-11 10:28:08 New DCOM Attack Exploits Windows Installer for Backdoor Access (lien direct) SUMMARY Cybersecurity researchers at Deep Instinct have uncovered a novel and powerful Distributed Component Object Model (DCOM) based…
SUMMARY Cybersecurity researchers at Deep Instinct have uncovered a novel and powerful Distributed Component Object Model (DCOM) based…
★★★
Blog.webp 2024-12-10 18:51:51 Black Basta Ransomware Uses MS Teams, Email Bombing to Spread Malware (lien direct) The Black Basta ransomware group is using advanced social engineering tactics and a multi-stage infection process to target organizations.
The Black Basta ransomware group is using advanced social engineering tactics and a multi-stage infection process to target organizations.
Ransomware Malware ★★★
Blog.webp 2024-12-10 17:25:31 Dell Urges Immediate Update to Fix Critical Power Manager Vulnerability (lien direct) A critical security flaw in Dell Power Manager has been discovered that could allow attackers to compromise your systems and execute arbitrary code.
A critical security flaw in Dell Power Manager has been discovered that could allow attackers to compromise your systems and execute arbitrary code.
Vulnerability ★★★
Blog.webp 2024-12-10 14:57:28 Hackers Target Job Seekers with AppLite Trojan Using Fake Job Emails (lien direct) SUMMARY AppLite banking trojan is a newly discovered stealthy mobile malware threat targeting mobile devices. Learn about its…
SUMMARY AppLite banking trojan is a newly discovered stealthy mobile malware threat targeting mobile devices. Learn about its…
Malware Threat Mobile ★★★
Blog.webp 2024-12-10 12:40:34 How Red Teaming Helps Meet DORA Requirements (lien direct) The Digital Operational Resilience Act (DORA) sets strict EU rules for financial institutions and IT providers, emphasizing strong…
The Digital Operational Resilience Act (DORA) sets strict EU rules for financial institutions and IT providers, emphasizing strong…
★★★
Blog.webp 2024-12-10 01:50:59 ShinyHunters, Nemesis Linked to Hacks After Leaking Their AWS S3 Bucket (lien direct) Summary Cybersecurity researchers have identified a large-scale hacking operation linked to notorious ShinyHunters and Nemesis hacking groups. In…
Summary Cybersecurity researchers have identified a large-scale hacking operation linked to notorious ShinyHunters and Nemesis hacking groups. In…
★★★
Last update at: 2025-05-12 15:53:01
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter