The Finnish telecoms equipment firm Nokia is looking into the suspected release of source code material on a criminal hacking site. See also: Gartner Market Guide for DFIR Retainer Services. An attacker going by the handle “IntelBroker,” who is…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Cyberattack Impacts Georgia Hospital, Colorado Pathology Services
The number of hospitals that have been affected by ransomware, business email compromise, and other cyber threats is increasing across all sectors, from small community hospitals such as Memorial Hospital and Manor in Bainbridge, Georgia, to those with a…
How to Prevent a Ransomware Attack and Secure Your Business
In today’s world, the threat of cyberattacks is an ever-present concern for businesses of all sizes. The scenario of receiving a call at 4 a.m. informing you that your company has been hit by a ransomware attack is no…
Growing Use of Winos4.0 Toolkit Poses New Threat to Windows Users
Advanced hacking toolkit Winos4.0 spreads across the globe, security experts warn. Originally reported by Trend Micro, this new toolkit-just like known kits Cobalt Strike and Sliver-was connected to a string of recent cyber attacks in China, having initially spread…
Windows PCs at Risk as SteelFox Malware Targets Driver Vulnerabilities
Several experts have warned that hackers are using malware to attack Windows systems with the intention of mining cryptocurrency and stealing sensitive information from their devices. The latest Kaspersky Security Report claims to have spotted tens of thousands of…
Game Emulation: Keeping Classic Games Alive Despite Legal Hurdles
For retro gaming fans, playing classic video games from decades past is a dream, but it’s tough to do legally. This is where game emulation comes in — a way to recreate old consoles in software, letting people play vintage…
ZKP Emerged as the “Must-Have” Component of Blockchain Security.
Zero-knowledge proof (ZKP) has emerged as a critical security component in Web3 and blockchain because it ensures data integrity and increases privacy. It accomplishes this by allowing verification without exposing data. ZKP is employed on cryptocurrency exchanges to validate…
How to Protect Your Brand from Malvertising: Insights from the NCSC
Advertising is a key driver of revenue for many online platforms. However, it has also become a lucrative target for cybercriminals who exploit ad networks to distribute malicious software, a practice known as malvertising. The National Cyber Security Centre (NCSC)…
Chinese Botnet Quad7 Targets Global Organizations in Espionage Campaign
Microsoft has unveiled a sweeping cyber threat posed by a sophisticated Chinese botnet, Quad7, targeting organizations worldwide through advanced password spray attacks. Operated by a group identified as Storm-0940, this campaign primarily aims at high-value entities, including think tanks, government…
Google Cloud to Enforce Multi-Factor Authentication for Enhanced Security in 2025
As part of its commitment to protecting users’ privacy, Google has announced that by the end of 2025, all Google Cloud accounts will have to implement multi-factor authentication (MFA), also called two-step verification. Considering the sensitive nature of cloud…