Free Bitdefender Solution for ShrinkLocker Ransomware

Free Bitdefender Solution for ShrinkLocker Ransomware

Free Tool from Bitdefender Helps ShrinkLocker Ransomware Victims Recover Encrypted Files Bitdefender's Free Decryptor Tool Romanian cybersecurity company Bitdefender has introduced a free tool to assist victims of the ShrinkLocker ransomware in recovering encrypted data. After closely examining the…


0 Comments5 Minutes

GoIssue Targets GitHub Users with Mass Phishing Attacks

GoIssue Targets GitHub Users with Mass Phishing Attacks

Overview of the GoIssue Threat Recently, cybersecurity experts identified a new tool called GoIssue, an application that enables cybercriminals to send phishing messages on a massive scale, specifically targeting GitHub users. GoIssue initially appeared on the dark web forum Runion, promoted by a…


0 Comments4 Minutes

Critical Vulnerability Patched in Palo Alto Networks Expedition

New Security Risks in Palo Alto Networks Expedition and CyberPanel Software

Critical Vulnerability Patched in Palo Alto Networks Expedition A major security flaw has been identified and patched in Palo Alto Networks’ Expedition tool, according to the U.S. Cybersecurity and Infrastructure Security Agency (CISA). This vulnerability, now listed on CISA’s known exploited…


0 Comments3 Minutes

AndroxGh0st Expands Reach by Exploiting Security Flaws

AndroxGh0st Expands Reach by Exploiting Security Flaws

A Growing Cyber Threat The creators of AndroxGh0st malware have started using a wider range of security weaknesses in internet-exposed apps to spread the Mozi botnet. According to a report from CloudSEK, this botnet relies on remote code execution and credential-stealing techniques to keep a…


0 Comments4 Minutes

South Korea Hits Meta with Major Privacy Fine

South Korea Hits Meta with Major Privacy Fine

In a major step to uphold privacy rights, South Korea’s data privacy agency, the Personal Information Protection Commission (PIPC), has fined Meta Platforms Inc., the parent company of Facebook, 21.62 billion won, equivalent to approximately $15.67 million. The hefty fine comes after investigations…


0 Comments5 Minutes

Ollama AI Framework Security Breach

Ollama AI Framework Security Breach

In a detailed report released last week, Avi Lumelsky, a researcher from Oligo Security, shed light on six critical vulnerabilities within the Ollama AI framework. These security flaws could be used by attackers to launch various types of malicious activities, such as denial-of-service (DoS)…


0 Comments6 Minutes

Apple Opens Private Cloud Compute for Security Research

In June, Apple unveiled its Private Cloud Compute (PCC), promoting it as the "most advanced security system ever built for cloud AI computing on a large scale." This innovation allows the processing of demanding AI tasks in the cloud while maintaining user privacy. Now, Apple has made the PCC…


0 Comments3 Minutes

Gophish Toolkit Delivers Remote Access Trojans

Gophish Toolkit Delivers Remote Access Trojans

A new phishing campaign has emerged, primarily targeting Russian-speaking consumers. The attackers are leveraging Gophish, an open-source toolkit, to distribute DarkCrystal RAT (DCRat) and a new remote access trojan called PowerRAT. You might be interested in: 7 Data Breach Disasters – Lessons for…


0 Comments4 Minutes

Chinese Hackers APT41 Attack Gambling Companies

Chinese Hackers APT41 Attack Gambling Companies

Chinese state-backed hacking group APT41, also known as Brass Typhoon, Earth Baku, Wicked Panda, or Winnti, carried out a sophisticated cyber attack targeting the gambling and gaming sector. According to Ido Naor, co-founder and CEO of Security Joes, the hackers managed to infiltrate a company’s…


0 Comments4 Minutes

North Korean IT Workers Extort Western Firms

North Korean IT Workers Extort Western Firms

North Korean IT Workers, who have been known to secure jobs in Western companies under false identities, are stepping up their tactics. Previously focused on stealing intellectual property, they are now extorting their employers by demanding ransoms to prevent the release of stolen data. This new…


0 Comments5 Minutes