This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here
Category: Information
Chinese State-Backed Cyber Espionage Targets Southeast ...
An unnamed high-profile government organization in Southeast Asia emerged as the target of a "complex, long-running" Chinese state...
Google Maps Timeline Data to be Stored Locally on Your ...
Google has announced plans to store Maps Timeline data locally on users' devices instead of their Google account effective Decembe...
Hackers Target Python Developers with Fake "Crytic-Comp...
Cybersecurity researchers have discovered a malicious Python package uploaded to the Python Package Index (PyPI) repository that's...
Hackers Exploit Legitimate Packer Software to Spread Ma...
Threat actors are increasingly abusing legitimate and commercially available packer software such as BoxedApp to evade detection a...
Third-Party Cyber Attacks: The Threat No One Sees Comin...
Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill’s threat experts. ...
Prevent Account Takeover with Better Password Security
Tom works for a reputable financial institution. He has a long, complex password that would be near-impossible to guess. He’s memo...
Muhstik Botnet Exploiting Apache RocketMQ Flaw to Expan...
The distributed denial-of-service (DDoS) botnet known as Muhstik has been observed leveraging a now-patched security flaw impactin...
SPECTR Malware Targets Ukraine Defense Forces in SickSy...
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks targeting defense forces in the country with...
Commando Cat Cryptojacking Attacks Target Misconfigured...
The threat actor known as Commando Cat has been linked to an ongoing cryptojacking attack campaign that leverages poorly secured D...
FBI Distributes 7,000 LockBit Ransomware Decryption Key...
The U.S. Federal Bureau of Investigation (FBI) has disclosed that it's in possession of more than 7,000 decryption keys associated...
The AI Debate: Google's Guidelines, Meta's GDPR Dispute...
Google is urging third-party Android app developers to incorporate generative artificial intelligence (GenAI) features in a respon...
LightSpy Spyware's macOS Variant Found with Advanced Su...
Cybersecurity researchers have disclosed that the LightSpy spyware recently identified as targeting Apple iOS users is in fact a p...