Source
HackRead
Dutch police arrested four individuals for selling stolen personal data via Telegram groups, seizing devices and firearms in…
Lumma Stealer malware uses fake CAPTCHA to deceive victims. This information-stealing malware targets sensitive data like passwords and…
Anti-bot services on the dark web allow phishers to bypass Google’s Red Page warnings, evading detection and making…
Cary, NC, 22nd October 2024, CyberNewsWire
The Internet Archive (Archive.org) suffered a second security breach in October 2024, exposing support tickets through unrotated Zendesk…
A hacker known as “TAINTU” is advertising a “Top Secret U.S. Space Force Military Technology Archive” for sale,…
Researchers at Microsoft discovered a new macOS vulnerability, “HM Surf” (CVE-2024-44133), which bypasses TCC protections, allowing unauthorized access…
A new Gorilla Botnet has launched massive DDoS attacks, targeting over 100 countries, according to cybersecurity firm NSFOCUS.…
Hackers impersonate ESET in phishing attacks targeting Israeli organizations. Malicious emails, claiming to be from ESET, deliver wiper…
Iranian hackers are targeting critical infrastructure organizations with brute force tactics. This article explores their techniques, including MFA…