Mozilla Updates Firefox Terms Again After Backlash Over Broad Data License Language

01/03/2025 0 Comments 0 tags

Firefox browser maker Mozilla on Friday updated its Terms of Use a second time within a week following criticism overbroad language that appeared to give the company the rights to

Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone

28/02/2025 0 Comments 0 tags

A 23-year-old Serbian youth activist had their Android phone targeted by a zero-day exploit developed by Cellebrite to unlock the device, according to a new report from Amnesty International. “The

5,000 Phishing PDFs on 260 Domains Distribute Lumma Stealer via Fake CAPTCHAs

28/02/2025 0 Comments 0 tags

Cybersecurity researchers have uncovered a widespread phishing campaign that uses fake CAPTCHA images shared via PDF documents hosted on Webflow’s content delivery network (CDN) to deliver the Lumma stealer malware.

RDP: a Double-Edged Sword for IT Teams – Essential Yet Exploitable

28/02/2025 0 Comments 0 tags

Remote Desktop Protocol (RDP) is an amazing technology developed by Microsoft that lets you access and control another computer over a network. It’s like having your office computer with you

Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme

28/02/2025 0 Comments 0 tags

Microsoft on Thursday unmasked four of the individuals that it said were behind an Azure Abuse Enterprise scheme that involves leveraging unauthorized access to generative artificial intelligence (GenAI) services in

Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and Belarus

28/02/2025 0 Comments 0 tags

The threat actor known as Sticky Werewolf has been linked to targeted attacks primarily in Russia and Belarus with the aim of delivering the Lumma Stealer malware by means of

12,000+ API Keys and Passwords Found in Public Datasets Used for LLM Training

28/02/2025 0 Comments 0 tags

A dataset used to train large language models (LLMs) has been found to contain nearly 12,000 live secrets, which allow for successful authentication. The findings once again highlight how hard-coded

Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations

27/02/2025 0 Comments 0 tags

A new campaign is targeting companies in Taiwan with malware known as Winos 4.0 as part of phishing emails masquerading as the country’s National Taxation Bureau. The campaign, detected last

New TgToxic Banking Trojan Variant Evolves with Anti-Analysis Upgrades

27/02/2025 0 Comments 0 tags

Cybersecurity researchers have discovered an updated version of an Android malware called TgToxic (aka ToxicPanda), indicating that the threat actors behind it are continuously making changes in response to public

89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New Report Reveals

27/02/2025 0 Comments 0 tags

Organizations are either already adopting GenAI solutions, evaluating strategies for integrating these tools into their business plans, or both. To drive informed decision-making and effective planning, the availability of hard