
jailbreaking
Jailbroken Devices Expose Users to Alarming Malware Risks, Study Finds
New research raises serious concerns about the security risks associated with jailbreaking or rooting mobile devices.
jailbreaking
New research raises serious concerns about the security risks associated with jailbreaking or rooting mobile devices.
cybersecurity
Independent cybersecurity analysts are sounding the alarm over the increasingly sophisticated use of Traffic Distribution Systems (TDS) by malicious actors.
homelab
Magic Grants has developed four powerful applications that transform TrueNAS Scale into a privacy powerhouse: a Monero node, Monero Wallet RPC, Arti (Tor's rust implementation), and I2P.
lockbit
Law Enforcement Uncovers Suspected Cybercriminal's Access to LockBit Builder Source Code In a recent development in the world of cybercrime, law enforcement has made a significant discovery on the suspect's computer
CISA
Election Security Under Threat: Experts Warn of Consequences as DHS Defunds Key Agencies
healthcare
Healthcare Organizations Urged to Strengthen Cybersecurity Amid Rising Threats
A coalition of consumer advocacy organizations, including Consumer Reports, Secure Resilient Future Foundation (SRFF), and US Public Interest Research Group (PIRG) have introduced a model bill to increase transparency around the end-of-life support for Internet of Things (IoT) devices.
AI
F5 Unveils New Application Delivery Controller and Security Platform with Integrated AI Capabilities
0-day
Nation-State Threat Actors Leverage Obscure Windows Feature to Target Victims A recent cybersecurity firm Trend Micro investigation revealed a new tactic used by nation-state threat actors to target victims
Attack Surface
Exposed Login Panels Pose Serious Security Risk for Companies
ransomware
Cybercriminal Group Medusa Targets Critical Infrastructure Sectors A sophisticated cybercriminal group known as Medusa has been targeting many critical infrastructure sectors in the United States.
api
New Advanced Persistent Threat Utilizes Obfuscated Batch Files and PowerShell Scripts to Deliver Rootkit Researchers have discovered a sophisticated attack chain that uses multiple layers of obfuscated batch files and PowerShell scripts to deliver a persistent rootkit.