Category: Information

Chinese State-Backed Cyber Espionage Targets Southeast ...

An unnamed high-profile government organization in Southeast Asia emerged as the target of a "complex, long-running" Chinese state...

Read More

Google Maps Timeline Data to be Stored Locally on Your ...

Google has announced plans to store Maps Timeline data locally on users' devices instead of their Google account effective Decembe...

Read More

Hackers Target Python Developers with Fake "Crytic-Comp...

Cybersecurity researchers have discovered a malicious Python package uploaded to the Python Package Index (PyPI) repository that's...

Read More

Hackers Exploit Legitimate Packer Software to Spread Ma...

Threat actors are increasingly abusing legitimate and commercially available packer software such as BoxedApp to evade detection a...

Read More

Third-Party Cyber Attacks: The Threat No One Sees Comin...

Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill’s threat experts. ...

Read More

Prevent Account Takeover with Better Password Security

Tom works for a reputable financial institution. He has a long, complex password that would be near-impossible to guess. He’s memo...

Read More

Muhstik Botnet Exploiting Apache RocketMQ Flaw to Expan...

The distributed denial-of-service (DDoS) botnet known as Muhstik has been observed leveraging a now-patched security flaw impactin...

Read More

SPECTR Malware Targets Ukraine Defense Forces in SickSy...

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks targeting defense forces in the country with...

Read More

Commando Cat Cryptojacking Attacks Target Misconfigured...

The threat actor known as Commando Cat has been linked to an ongoing cryptojacking attack campaign that leverages poorly secured D...

Read More

FBI Distributes 7,000 LockBit Ransomware Decryption Key...

The U.S. Federal Bureau of Investigation (FBI) has disclosed that it's in possession of more than 7,000 decryption keys associated...

Read More

The AI Debate: Google's Guidelines, Meta's GDPR Dispute...

Google is urging third-party Android app developers to incorporate generative artificial intelligence (GenAI) features in a respon...

Read More

LightSpy Spyware's macOS Variant Found with Advanced Su...

Cybersecurity researchers have disclosed that the LightSpy spyware recently identified as targeting Apple iOS users is in fact a p...

Read More

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here